Never Give Up
Never Give Up
Application Report
SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in
Security Features
ABSTRACT
The CC3120/CC3130/CC3135 and CC3220/CC3230/CC3235x devices are part of the SimpleLink™
microcontroller (MCU) platform, which consists of Wi-Fi®, Bluetooth® low energy, Sub-1 GHz and host MCUs.
All share a common, easy-to-use development environment with a single core software development kit (SDK)
and rich tool set. A one-time integration of the SimpleLink platform lets you add any combination of devices from
the portfolio into your design. The ultimate goal of the SimpleLink platform is to achieve 100 percent reuse when
your design requires change. For more information, visit www.ti.com/simplelink.
The SimpleLink MCU portfolio offers a single development environment that delivers flexible hardware, software,
and tool options for customers developing wired and wireless applications. With an ultimate goal of 100 percent
code reuse across host MCUs, Wi-Fi, Bluetooth low energy, Sub-1 GHz devices, and more, choose the MCU or
connectivity standard that fits your design. A one-time investment with the SimpleLink software development kit
(SDK) lets you reuse often, opening the door to create unlimited applications. For more information, visit
www.ti.com/simplelink.
Table of Contents
1 Introduction.............................................................................................................................................................................3
1.1 Terminology........................................................................................................................................................................3
1.2 Internet of Things (IoT) Products and Security.................................................................................................................. 4
1.3 Main Features.................................................................................................................................................................... 6
2 Network Layer Security........................................................................................................................................................10
2.1 Wi-Fi Security...................................................................................................................................................................10
2.2 Secure Socket Layer........................................................................................................................................................ 11
3 File System Security.............................................................................................................................................................18
3.1 Overview.......................................................................................................................................................................... 18
3.2 File System Security Features Description...................................................................................................................... 19
3.3 File Creation Attributes.....................................................................................................................................................23
4 Programming the Device..................................................................................................................................................... 23
4.1 During Development........................................................................................................................................................ 24
4.2 During Production............................................................................................................................................................ 24
5 In-field Software Updates.....................................................................................................................................................25
5.1 File Bundle Protection...................................................................................................................................................... 25
5.2 Secure Content Delivery.................................................................................................................................................. 25
6 Security for Application Layers...........................................................................................................................................28
6.1 Secure Key Storage......................................................................................................................................................... 28
6.2 Hardware Crypto Engines (CC3220/CC3230/CC3235x Devices Only)........................................................................... 28
7 Runtime Binary Protection...................................................................................................................................................30
7.1 CC3220S/CC3230S/CC3235S Devices...........................................................................................................................30
7.2 CC3220SF/CC3230SF/CC3235SF Devices.................................................................................................................... 30
8 Design for Security...............................................................................................................................................................32
8.1 Closing Remarks..............................................................................................................................................................32
Revision History.......................................................................................................................................................................33
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 1
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Trademarks www.ti.com
Trademarks
SimpleLink™, Internet-on-a chip™, Texas Instruments™, and LaunchPad™ are trademarks of Texas Instruments.
Wi-Fi-CERTIFIED™ is a trademark of Wi-Fi Alliance.
Wi-Fi® and Wi-Fi Alliance® are registered trademarks of Wi-Fi Alliance.
Bluetooth® is a registered trademark of Bluetooth SIG.
VeriSign® is a registered trademark of VeriSign, Inc.
GoDaddy® is a registered trademark of GoDaddy Operating Company, LLC.
GeoTrust® is a registered trademark of GeoTrust Inc.
Arm® and Cortex® are registered trademarks of Arm Limited.
All other trademarks are the property of their respective owners.
2 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Introduction
1 Introduction
Internet of Things (IoT) products and systems hold information that may be sensitive and private, thus stressing
the importance of securing the data. This data may include passwords, keys, credentials, configurations,
personal information, vendor intellectual property (IP), and more. Even data that does not seem sensitive or
confidential could potentially reveal information that could be used to design an attack on sensitive data.
The SimpleLink Wi-FiInternet-on-a chip™ family of devices from Texas Instruments™ offers a wide range of built-
in security features to help developers address a variety of security needs, which is achieved without any
processing burden on the main MCU. This document describes these security-related features and provides
recommendations for leveraging each feature in the context of practical system implementation.
The CC3x20 and CC3x3x devices are designed such that the network security software runs within the
dedicated subsystem on the device. This subsystem is an on-chip network processor equipped with a hardware
encryption engine, resulting in a separate execution environment, thus offloading the main MCU of the system.
The security features span a wide variety of activities typical throughout the product life cycle, including
networking activities, data storage, IP protection, cloning protection, and provisions for security during
production. These security features are made available to vendors through an ecosystem that incorporates
simple and concise APIs, tools, and documentation.
1.1 Terminology
Table 1-1 provides brief descriptions of the key terms that are required to understand the security methods and
features.
Table 1-1. Terminology
Term Description
An asset is any piece of information (security-relevant elements) that has value to its owner. It therefore must be
Asset protected by the measures of the target system (by means of confidentiality, integrity, authenticity). Assets may be
proprietary information, personal data, or intellectual property.
Asymmetric key pairs are used in algorithms where one party performs a cryptographic operation with a key that is not
Asymmetric keys the same as the key used to apply the reverse operation. The pairs are defined as public and private keys, and used
mostly for digital signing and symmetric key distribution.
Attack vector A set of actions used to defeat system security measures, thereby gaining control over one or more assets.
Ensures that assets or entities are genuine and authorized to perform a task or used as intended. The verification
Authenticity process usually involves cryptographic algorithms, which check that the entities are who they claim to be. Some
predefined trust mechanism is always part of an authentication scheme.
Certificates are standard-formatted files. They typically contain the public key of the subject, and a CA signature of the
Certificates header and public key. Anyone provided with the CA public key (or sub-CA in case of certificate chain) can verify the
subject’s identity.
Certificate authority
A trusted entity that issues certificates used to verify identities.
(CA)
Certificate chain, A certificate chain consists of a hierarchy of certificates that allows anyone to verify the identity of any certificate
Chain of trust issuer, down to the root certificate.
Cipher suite is a named combination of algorithms used for authentication, key exchange, data encryption, and
Cipher suite
message authentication code. This set of algorithms is used in an SSL handshake and session.
Confidentiality ensures that an asset is not made available or disclosed to unauthorized entities. In most cases,
Confidentiality confidentiality translates into encryption, while in other cases, obfuscation techniques are used to maintain
confidentiality
Exposure point An identified entry point to the system that enables the launch of one or more security attacks (an attack vector).
Integrity Attribute describing an object that remains intact, in its entirety, compared to its original version.
Keys are used for data encryption, key establishment, and digital signatures. The key lengths and types depend on
Keys
the algorithm used, their purpose, and the security level.
PKI Public key infrastructure.
Revoked certificate A certificate that is no longer authorized and valid by its issuer.
The topmost certificate provided by a certificate authority, against which the certificate chain is eventually verified. It is
Root CA
always self-signed and publicly available.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 3
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Introduction www.ti.com
x
x
x
x x x
x x
Vendor x
x x
x
x x x
x x
Application Servers
Internet
IoT Devices
User
User
4 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Introduction
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 5
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Introduction www.ti.com
PCB
Peripherals
CC32xx Network Processor + MCU
6 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Introduction
(1) The FIPS certification is in process, for the latest status refer to https://csrc.nist.gov/projects/cryptographic-module-validation-program/
validated-modules.
The CC3220 and CC323x devices have a unique architecture, with two physically separate MCU and memory
execution environments. Figure 1-3 shows a simple block diagram of the CC3220/CC3230/CC3235x device and
represents the security features they offer.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 7
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Introduction www.ti.com
CC32xx Single Chip Wireless-MCU Solution With Built-In Multi-Layer Security Features
CC32xx Network Processor + MCU
CC32XX Network Processor + MCU
Secure Boot
boot Device Identity
identity
Application
Application Local
Local Area Network
Network
Personal
Personaland
&
HW
HW Crypto
crypto engines
Engines HTTPS Server
server
Enterprise
enterprise Security
security
Cross-Layer
Cross-Layer
Trusted
Trusted Root
root
Secure
Secure Key
key Storage
storage
Certificate
certificate catalog
Catalog
Separate Execution
execution Enhanced
Enhanced File
file TI root-of-trust
Environment
environment System
system Security
security public key
Software
Software Tamper
tamper
Initial secure programming Cloning Protection
protection
Detection
detection
8 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Introduction
Figure 1-4 shows a block diagram of the security features offered by the CC3120/CC3130/CC3135 device.
CC31xx Networking Processor With Built-In Multi-Layer Security Features
CC31xx
Personal and
HTTPS server
enterprise security
Separate execution
environment Cross-Layer
Trusted root
Secure key storage
certificate catalog
Software tamper
Cloning protection
detection
Initial secure
programming
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 9
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Network Layer Security www.ti.com
AES (WPA2-PSK/WPA2+PMK/WPA3-PSK)
Personal TKIP (WPA-PSK)
WEP
EAP Fast
EAP PEAPv0 MSCHAPv2
EAP PEAPv0 TLS
Enterprise EAP PEAPv1 TLS
EAP TLS
EAP TTLS TLS
EAP TTLS MSCHAPv2
10 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Network Layer Security
All wireless passwords are stored in an encrypted form on the serial flash. These passwords are solely
consumed by the network processor (NWP) and not available to the host through APIs or any debug channel.
Note
WEP security is flawed by design and has been compromised. TI strongly recommends not using it. It
is supported by the SimpleLink product for legacy compliance reasons only.
SL_SEC_MASK_SSL_RSA_WITH_RC4_128_SHA
SL_SEC_MASK_SSL_RSA_WITH_RC4_128_MD5
SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA
SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_256_CBC_SHA
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_RC4_128_SHA
SL_SEC_MASK_TLS_RSA_WITH_AES_128_CBC_SHA256
SL_SEC_MASK_TLS_RSA_WITH_AES_256_CBC_SHA256
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
Ciphers suites SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
SL_SEC_MASK_TLS_RSA_WITH_AES_128_GCM_SHA256
SL_SEC_MASK_TLS_RSA_WITH_AES_256_GCM_SHA384
SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
SL_SEC_MASK_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
SL_SEC_MASK_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
SL_SEC_MASK_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
SL_SEC_MASK_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 11
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Network Layer Security www.ti.com
Server authentication
Client authentication
Other Domain name verification
Separate execution environment
OCSP (on CC3x3x only)
12 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Network Layer Security
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 13
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Network Layer Security www.ti.com
Client Server
Establish security
Client hello
capabilities
including protocol
version and Cipher
Server hello
Suite
Certificate
Finished
14 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Network Layer Security
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 15
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Network Layer Security www.ti.com
ROM Certificate
Authentication
Process
Root CA
Figure 2-3. Certificate Files and Relationship With the Trusted Root-Certificate Catalog
16 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Network Layer Security
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 17
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
File System Security www.ti.com
18 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com File System Security
The network processor automatically generates the tokens for secure files. The master token is the output
parameter of the file creation function, and is received by the host.
The Get Info function enables the host to retrieve all the accessible file tokens by providing a valid file token as
an input. Only tokens with lower priority than the input one can be retrieved.
The default system behavior is to regenerate all the file tokens, except for the master token, each time the file is
opened for a write operation. This default behavior can be changed by the file creation flags. The file creation
flags can override the default behavior of the token creation. File creation is explained in Section 3.3.
When a secure file is opened for write, the open-write function returns the new generated token. The returned
token is on the same level as the input token.
For example, for a file opened for write with the write token as input, the new file write token is returned.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 19
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
File System Security www.ti.com
Note
The certificate expiration date is not validated during this file authentication process, because there is
no absolute way to ensure the local date and time validity can work in all use cases.
When creating a new secure file, there is an option to skip the file authentication default behavior. This is done
by using a dedicated creation flag: SL_FS_CREATE_NOSIGNATURE.
Figure 3-1 shows the file authentication process.
HASH
Trusted root-certificate
catalogue
ROM Certificate
Root CA
CA
File
The signature is used
only during write
Authentication
Process
Vendor Certificate
µ
Signature
20 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com File System Security
3.2.5.1 Origin Authentication for the Service-Pack and the Trusted Root-Certificate Catalog
The service pack and the trusted root-certificate catalog are files provided and signed by TI only.
Writing the service pack and the certificate store files requires a signature; the signatures for those files are
supplied by TI. Certificate material is preinstalled on the device.
The trusted root-certificate catalog contains a list of revoked certificates. If a certificate from this list is
encountered in the course of an SSL/TLS connection, the connection is terminated and the device triggers an
event to the host.
3.2.6 Recovery Mechanism
The SimpleLink device embeds an internal recovery mechanism that allows the file system to be rolled back to a
predefined image programmed during production.
The recovery image is a system file kept on the serial flash. The file is stored as a secure file. The recovery
image file is listed as part of the files list, but is inaccessible from the host.
The following methods can be used to trigger the recovery procedure:
• Setting the SOP
• Function call from the host to sl_DeviceSet
The recovery mechanism supports several modes; the device recovery mode is configured during the creation of
the file system image.
The supported recovery modes are:
• None – No recovery settings; in this case, the recovery image file is not kept.
• Enable restore to factory-default.
• Enable restore to factory-image and factory-default.
Restore to factory-image – The factory image file contains the programmed image files, which includes the
service pack, host application (in the case of the CC3220/CC3230/CC3235x), configuration files, and user files.
Once invoked, the device is formatted and reprogrammed. The content of all files is replaced with the factory
image files. Files that do not exist in the original image are deleted. The restore to factory-image can be invoked
by a host command or by setting the SOP.
Restore to factory-default – Restore to factory-default is similar to restore to factory-image. The difference is that
the service pack and the host application (in the case of the CC3220/CC3230/CC3235x) are not restored, so the
latest service pack and the latest host application are used. When using this method, any file that the host app
might use is restored to the programmed content.
The restore-to-factory process is fail-safe, and it resumes even if a power failure occurs during the operation.
3.2.7 Tamper Alerts
The SimpleLink device provides a data-tampering procedure with a security-alert counter. This procedure
detects integrity violations when accessing the file system, for system files and files that are created as secure
and authenticate.
Access violations (such as attempts to access files with an invalid or improper token) are also monitored and
detected as a tamper attempt.
When the system reaches the predefined limit of security alerts, the device is locked and an asynchronous event
is triggered.
To recover from a locked state, the device must be reprogrammed or restored to factory image.
The security alerts counter is persistent and its value is set to 0 as part of the programming process, or as part of
the restore-to-factory functions only.
The security alert threshold can be configured during image creation (using the image creator tool).
The host can retrieve the current number of security alerts in the system using the sl_deviceGet API.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 21
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
File System Security www.ti.com
The device is locked when the alert counter crosses the alerts threshold.
Implicit alerts are created when detecting the following tamper events:
• Invalid or improper access token
Implicit alerts • Integrity violation of a file created as a secure and authenticate file when opened for
read
• Setting an invalid signature or invalid certificate when updating the content of a secure
and authenticate file
22 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com File System Security
Table 3-6 is a list of flags that are not creation flags. These noncreation flags can be set every time a file is
opened for write.
Table 3-6. Noncreation Flags
Type Description
SL_FS_WRITE_BUNDLE_FILE Used for the bundle commit feature.
SL_FS_WRITE_ENCRYPTED Used for secure content delivery.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 23
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Programming the Device www.ti.com
Note
The CC32xx LaunchPad™ Development Kit is equipped with a connector to allow attaching an
external programmer to test this method.
24 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com In-field Software Updates
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 25
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
In-field Software Updates www.ti.com
User
Get key
Generate temp pair
Public key
Public key
Generate ECDHE secret.
Write data
(cipher text)
Close file
26 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com In-field Software Updates
32
SHA256 on RAW data
Bytes
AES256
RAW data
(AES256) n Bytes
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 27
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Security for Application Layers www.ti.com
28 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Security for Application Layers
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 29
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Runtime Binary Protection www.ti.com
30 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Runtime Binary Protection
Application code
Application code image linked to run
The bootloader scans and detects from 0x0100_0800
a new image on the serial flash and copies it
/sys/mcuflashimg.bin to the on-chip flash.
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 31
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
Design for Security www.ti.com
32 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
www.ti.com Revision History
Revision History
NOTE: Page numbers for previous revisions may differ from page numbers in the current version.
Changes from Revision B (May 2018) to Revision C (September 2020) Page
• Changed the document title and throughout document to include CC3230 devices.......................................... 3
• Changed the descriptions of the "Personal and Enterprise Wi-Fi security" and "Cloning protection" rows in
Table 1-2, Main Security Features ..................................................................................................................... 6
• Changed the AES entry in the "Personal" row in Table 2-1, Wi-Fi Security .....................................................10
• Changed the "Cloning protection" list item in Section 3.1, Overview ...............................................................18
• Changed the first sentence in Section 3.2.2, Cloning Protection .....................................................................19
SWRA509C – FEBRUARY 2017 – REVISED SEPTEMBER 2020 SimpleLink™ Wi-Fi® CC3x20, CC3x3x Built-in Security Features 33
Submit Document Feedback
Copyright © 2020 Texas Instruments Incorporated
IMPORTANT NOTICE AND DISCLAIMER
TI PROVIDES TECHNICAL AND RELIABILITY DATA (INCLUDING DATA SHEETS), DESIGN RESOURCES (INCLUDING REFERENCE
DESIGNS), APPLICATION OR OTHER DESIGN ADVICE, WEB TOOLS, SAFETY INFORMATION, AND OTHER RESOURCES “AS IS”
AND WITH ALL FAULTS, AND DISCLAIMS ALL WARRANTIES, EXPRESS AND IMPLIED, INCLUDING WITHOUT LIMITATION ANY
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT OF THIRD
PARTY INTELLECTUAL PROPERTY RIGHTS.
These resources are intended for skilled developers designing with TI products. You are solely responsible for (1) selecting the appropriate
TI products for your application, (2) designing, validating and testing your application, and (3) ensuring your application meets applicable
standards, and any other safety, security, regulatory or other requirements.
These resources are subject to change without notice. TI grants you permission to use these resources only for development of an
application that uses the TI products described in the resource. Other reproduction and display of these resources is prohibited. No license
is granted to any other TI intellectual property right or to any third party intellectual property right. TI disclaims responsibility for, and you
will fully indemnify TI and its representatives against, any claims, damages, costs, losses, and liabilities arising out of your use of these
resources.
TI’s products are provided subject to TI’s Terms of Sale or other applicable terms available either on ti.com or provided in conjunction with
such TI products. TI’s provision of these resources does not expand or otherwise alter TI’s applicable warranties or warranty disclaimers for
TI products.
TI objects to and rejects any additional or different terms you may have proposed. IMPORTANT NOTICE
Mailing Address: Texas Instruments, Post Office Box 655303, Dallas, Texas 75265
Copyright © 2022, Texas Instruments Incorporated