Normal World and Secure World using TrustZone Diagram.

Getting Started

The Arm CryptoCell-300 family of embedded security solutions is aimed at high efficiency systems with emphasis on small footprint and low power consumption. The CryptoCell-300 family offers platform security services as well as a rich set of cryptographic services, targeting multiple threats. These services are needed across various Internet of Things (IoT) domains such as home automation, factory automation, smart energy, industrial IoT and other areas where there is potential usage of an Arm Cortex®-M processor. 

The CryptoCell-300 family uses a modular approach which consists of control and scheduling, data interfaces, cryptography and various security resources to enable the right level of security and PPA trade-offs for a particular threat model.

CryptoCell complements TrustZone for Armv8-M and together these solutions form a Trusted Execution Environment (TEE). This helps reduce the attack surface and isolate sensitive assets and processes from potentially malicious application code.


Key Features

The CryptoCell-300 family provides these key features to owners of assets on the platform (chip vendors, device makers and more):

  • Brand-name and IP protection through enforcement of code authentication and code confidentiality – the IP allows an image owner to deliver the code to the target device – in the field or on the manufacturing floor - signed and encrypted. That code owner can be a chip vendor, a device maker, or other entities in the ecosystem. The model allows chip vendors and other entities to rely on different roots of trust, without having to share them.

  • Authenticated debug, allowing authorization of ecosystem partners for specific capabilities – the IP allows cryptographic enforcement of a debug policy that takes into account the state of the device (e.g. manufacturing and deployment status) and the specific grants the entity attempting to debug has received from an authorized entity (e.g. the OEM behind the device). The IP allows fine granularity of debug control, as well as separated authorization path for different owners of assets in the device.

  • Secure provisioning of code and data, allowing different entities to send assets to the device in a manner preserving the integrity and confidentiality over untrusted communication means.

  • Hardware based management of roots-of-trust, enforcing different access control policies based on the state of the device (e.g. manufacturing and deployment status).

  • Efficient implementation of a rich set of cryptographic services such as:

  • Symmetric ciphers like AES and chacha20 (operational in multiple modes).

  • Hashing functions like SHA1, SHA256 and keyed-hash message authentication code (HMAC) based on these hash functions.

  • Asymmetric cryptographic schemes like RSA and various schemes based Elliptic Curve Cryptography.

  • Random number generation based on a true source of entropy.

The support for some of these modes is optional and allows the integrator to trade off area footprint with performance.

CryptoCell-312 is also available with enhancements which help protect against side-channel attacks (CryptoCell-312P)

Want to know more about Security on Arm?

Learn more

Free on-demand training webinar about Arm CryptoCell

Simplifying the design of secure IoT systems

Get support

Arm support

Arm training courses and on-site system-design advisory services enable licensees to realize maximum system performance with lowest risk and fastest time-to-market.

Arm training courses  Open a support case
Answered Where do I find presentations and photos from SC'18? 0 votes 409 views 0 replies Started 2 months ago by John Linford Answer this
Discussion Please consider my tag for inclusion on the ARM Community 1 votes 16493 views 25 replies Latest 1 months ago by SULMIYATDAD Answer this
Discussion 广州会议费发票 0 votes 2 views 0 replies Started 6 hours ago by 十多个大帅哥 Answer this
Discussion 诟踊矣郴烤员儇寐 0 votes 3 views 0 replies Started 6 hours ago by 十多个大帅哥 Answer this
Not answered TTTTTTTTTTT 0 votes 10 views 0 replies Started 7 hours ago by zwmseo Answer this
Not answered ttttttttt 0 votes 11 views 0 replies Started 7 hours ago by zwmseo Answer this
Answered AXI4 - read data interleaving
  • AMBA
  • AXI
  • AXI4
  • interleaving
0 votes 6542 views 9 replies Latest 8 hours ago by hayk Answer this
Discussion Looking for activation code of DS-5 Community Edition 0 votes 4395 views 14 replies Latest 12 hours ago by Drarkin Answer this
Not answered How to start with Cortex-M1
  • cortex-m1
0 votes 20 views 0 replies Started 16 hours ago by Juanea7 Answer this
Suggested answer PMU使用问题 0 votes 147 views 4 replies Latest 17 hours ago by 章政 Answer this
Not answered ASM strong function gets replaced by weak function 0 votes 23 views 0 replies Started 18 hours ago by Pavel Krupets Answer this
Discussion 北京会议费发票rd 0 votes 23 views 0 replies Started 19 hours ago by zhangxianjun Answer this
Answered Where do I find presentations and photos from SC'18? Started 2 months ago by John Linford 0 replies 409 views
Discussion Please consider my tag for inclusion on the ARM Community Latest 1 months ago by SULMIYATDAD 25 replies 16493 views
Discussion 广州会议费发票 Started 6 hours ago by 十多个大帅哥 0 replies 2 views
Discussion 诟踊矣郴烤员儇寐 Started 6 hours ago by 十多个大帅哥 0 replies 3 views
Not answered TTTTTTTTTTT Started 7 hours ago by zwmseo 0 replies 10 views
Not answered ttttttttt Started 7 hours ago by zwmseo 0 replies 11 views
Answered AXI4 - read data interleaving Latest 8 hours ago by hayk 9 replies 6542 views
Discussion Looking for activation code of DS-5 Community Edition Latest 12 hours ago by Drarkin 14 replies 4395 views
Not answered How to start with Cortex-M1 Started 16 hours ago by Juanea7 0 replies 20 views
Suggested answer PMU使用问题 Latest 17 hours ago by 章政 4 replies 147 views
Not answered ASM strong function gets replaced by weak function Started 18 hours ago by Pavel Krupets 0 replies 23 views
Discussion 北京会议费发票rd Started 19 hours ago by zhangxianjun 0 replies 23 views