This repository contains a target-agnostic Software Framework for the OPTIGA™ Trust M security chip. It is a base for other application notes. Be aware that this software comes without any security claims and shall be used for evaluation purpose.
- High-end security controller
- Common Criteria Certified EAL6+ (high) hardware
- Turnkey solution
- Up to 10kB user memory
- PG-USON-10 package (3 x 3 mm)
- Temperature range (−40°C to +105°C)
- I2C interface with Shielded Connection (encrypted communication)
- Cryptographic support:
- ECC : NIST curves up to P-521, Brainpool r1 curve up to 512,
- RSA® up to 2048
- AES key up to 256 , HMAC up to SHA512
- TLS v1.2 PRF and HKDF up to SHA512
- Crypto ToolBox commands for SHA-256, ECC and RSA® Feature, AES, HMAC and Key derivation
- Configurable device security monitor, 4 Monotonic up counters
- Protected(integrity and confidentiality) update of data, key and metadata objects
- Hibernate for zero power consumption
- Lifetime for Industrial Automation and Infrastructure is 20 years and 15 years for other Application Profiles
Features | Supported Curve/Algorithm | V1 | V3 |
---|---|---|---|
ECC | ECC NIST P256/384 | ✓ | ✓ |
ECC NIST P521, ECC Brainpool P256/384/512 r1 | ✓ | ||
RSA | RSA® 1024/2048 | ✓ | ✓ |
Key Derivation | TLS v1.2 PRF SHA 256 | ✓ | ✓ |
TLS v1.2 PRF SHA 384/512 | ✓ | ||
HKDF SHA-256/384/512 | ✓ | ||
AES | Key size - 128/192/256 (ECB, CBC, CBC-MAC, CMAC) | ✓ | |
Random Generation | TRNG, DRNG, Pre-Master secret for RSA® Key exchange | ✓ | ✓ |
HMAC | HMAC with SHA256/384/512 | ✓ | |
Hash | SHA256 | ✓ | ✓ |
Protected data (object) update (Integrity) | ECC NIST P256/384 RSA® 1024/2048 Signature scheme as ECDSA FIPS 186-3/RSA SSA PKCS#1 v1.5 without hashing |
✓ | ✓ |
ECC NIST P521, ECC Brainpool P256/384/512 r1 Signature scheme as ECDSA FIPS 186-3/RSA SSA PKCS#1 v1.5 without hashing |
✓ | ||
Protected Data/key/metadata update (Integrity and/or confidentiality) | ECC NIST P256/384/521 ECC Brainpool P256/384/512 r1 RSA® 1024/2048 Signature scheme as ECDSA FIPS 186-3/RSA SSA PKCS#1 v1.5 without hashing |
✓ |
Get started with the OPTIGA™ Trust M evaluation kit using this Application Note, or the FreeRTOS example
- Get started guide
- Off-Chip TLS example (mbedTLS)
- Cloud:
- Zephyr OS driver
- Secure Firmware Update and Secure Boot (link is pending)
- Arduino library
- Personalize OPTIGA™ Trust
- OpenSSL Engine and Command Line Interface (for RPi3)
- Python package
- I2C Utilities
- See Trust M Crypt API and Trust M Util API to know more about CRYPT and UTIL modules
- Information about the OPTIGA™ Trust M Command Library (CMD) can be found in the Solution Reference Manual In the same document you can find explanation of all Object IDs (OIDs) available for users as well as detailed technical explanation for all features and envisioned use cases.
- Infineon I2C Protocol implementation details can be found here
- Platform Abstraction Layer (PAL) overview and Porting Guide are presented in the Wiki
For more information please refer to the Wiki page of this project
External links, open in the same tab.
-
OPTIGA™ Trust M Shield2Go Notes to the S2Go Security OPTIGA M:
- Supply voltage VCC is max. 5.5 V, please refer to the OPTIGA™ Trust M datasheet for more details about maximum ratings
- Ensure that no voltage applied to any of the pins exceeds the absolute maximum rating of VCC + 0.3 V
- Pin out on top (head) is directly connected to the pins of the OPTIGA™ Trust M
- If head is broken off, only one capacitor is connected to the OPTIGA™ Trust M
-
In which form does OPTIGA return keys and signatures? (Wiki)
-
User API
-
Hardware-Security: "Einfach (und) Sicher" (external link, opens in the same tab) in German, Slides in English
For high level description and some important excerpts from the documentation please refer to Wiki page
Other downloadable PDF documents can be found below:
- OPTIGA™ Trust M Datasheet v3.10 (PDF)
- OPTIGA™ Trust M Solution Reference Manual v3.15 (PDF)
- OPTIGA™ Trust M Keys and Certificates v3.10 (PDF)
- Infineon I2C protocol specification v2.03 (PDF)
If you are planning to integrate OPTIGA™ Trust M in your PCB design have a look at the recommendations found here (external, opens in the same tab).
Please read CONTRIBUTING.md for details on our code of conduct, and the process for submitting pull requests to us.
This project is licensed under the MIT License - see the LICENSE file for details