Professional Documents
Culture Documents
Sec1 20220627V1
Sec1 20220627V1
Cryptography Primer
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 1
SEC1 Class Objectives
• After this class, you will be able to explain:
• Why Embedded Security is needed now
• Why Microchip for Embedded Security
• Authentication, Integrity, and Confidentiality
• Hashing and its functions in cryptography
• “Secret key” - Symmetric Cryptography
• “Public key” - Asymmetric Cryptography
• Ways of spawning session keys
• Both symmetrically and asymmetrically
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 3
Incredible increase in ALL
attacks Why we need security now
60000
50000
40000
30000
20000
10000
*Symantec 2018 Internet Security Threat Report
0
IoT Attacks
2016 2017
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 4
Agenda
• Why we need Security now
• Why Microchip for Security?
• Confidentiality, Integrity, & Authentication
• Hashing
• Secret Key (Symmetric) cryptography
• Public Key (Asymmetric) cryptography
• Chain of Trust
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 5
Identification ≠ Authentication ≠ Authorization
Three terms often confused with each other
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 6
A closer look at Authentication
• Authentication
• Assures something is what it is declared to be
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 7
The Priority of Cryptographic
Functions
“CIA” is often cited, but “AI and sometimes C” is the reality
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 8
Agenda
• Why we need Security now
• Why Microchip for Security?
• Confidentiality, Integrity, & Authentication
• Hashing
• Secret Key (Symmetric) cryptography
• Public Key (Asymmetric) cryptography
• Chain of Trust
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 9
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 10
A hash is a fundamental building
block of cryptography
• A crypto hash uses a strong, irreversible, math transform
• Characteristics of a strong crypto hash:
• Easy to compute the digest,
• Infeasible to regenerate the original message
• Infeasible to modify a message without changing the digest
• Infeasible to find different messages with the same digest
32 Byte 32 Byte
Message Digest Message Digest
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 11
A hash is a fundamental building
block of cryptography
Crypto Hash
Hola Mundo! 1 SHA256
c5282bc8bf2aaed1dac678731f32d1d7a9e6a2cef7dfa462dfe1f636775d4620
Crypto Hash
Hola Mundo! 2 SHA256
093e392b5760c537b54a8167a02d2fc46729fa4ff9ba7ede0a92c4c71a2c4f93
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 12
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 13
Also used to authenticate messages
32Byte
Crypto
Message Hash or Cipher
Message Authentication Code
based (MAC)
authentication
function
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 14
Example of MAC Functions
• HMAC-SHA256
• Relies on a Hash Function
• ECC608 sup3r s3cr3t k3y
• AES-CMAC
• Relies on a Block Cipher
• LoRaWAN (MIC) sup3r s3cr3t k3y
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 15
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 16
Notes of SHA256
• Advanced Cheksum
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 17
Agenda
• Why we need Security now
• Why Microchip for Security?
• Confidentiality, Integrity, & Authentication
• Hashing
• Secret Key (Symmetric) cryptography
• Public Key (Asymmetric) cryptography
• Chain of Trust
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 18
Symmetric Key Cryptography
• Other common terms for symmetric key:
• Secret-key, Shared-key, and Single-key
• Uses identical key(s) for both encryption and decryption
• Example: using identical keys to lock and unlock a lock-box
Identical Keys
Alice Bob
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 19
Secret keys must remain… Secret
• Secret (Shared) Key Exchange
• Alice and Bob know and trust each other
• Alice can give Bob a copy of her Secret Key and Bob is
assured it is genuine and trusted based on his
knowledge and trust in Alice
Alice Bob
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 20
Secret keys must remain… Secret
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 21
Symmetric Identity Authentication
Alice wants to authenticate a connection with Bob
Alice and Bob know and trust each other and have copies of the secret key
Alice Bob
01100…111011
Alice generates a 01100…111011
random challenge
Is
Response
Correct?
Digest
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 22
How symmetric authentication would be
implemented in a real world system
Authenticating a Cartridge, for example
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 23
Provisioning of an accessory device
How the factory prepares devices
Parent Key
Manufacturing From HQ
Line Module
Ink Cartridge
Hardware
Security Crypto Element
Module
Unique SN#
Hash
Parent
Key
Unique
Derived Key
Printer
Crypto
Element
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 24
Authentication in the field
Printer
Ink Cartridge
Recreate the unique
Crypto Element
Crypto Element
derived key for
disposable
Parent
Key Unique SN#
HASH
Derived Key
Derived Key
Challenge the
disposable
Check
Response and
MAC
compare
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 25
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 26
That was “Identity Authentication”
Now let’s use hash for
“Message Authentication”
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 27
Symmetric Message Authentication
Bob wants authentication of a message from Alice
Alice and Bob know and trust each other and share a secret key
Alice Bob
01100…111011 Bob stores the
Message message
Alice generates a 01100…111011
message
Is
response
correct?
MAC
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 28
Hash for Symmetric Cryptography
to generate session keys
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 29
Symmetric Encryption
Now Alice wants to send Bob a secret message
Alice and Bob have previously shared an identical secret key
Alice Bob
01100…111011
Random challenge 01100…111011
Derived Key
Cipher Cipher
Plain Text Cipher Text Plain Text
(Encrypt) (Decrypt)
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 30
Advanced Encryption Standard (AES)
AES deserves a class to itself, so let’s just say each round of AES “replaces and
jumbles” things beyond the point of recognition
AES is offered in
different modes
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 31
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 32
Agenda
• Why we need Security now
• Why Microchip for Security?
• Confidentiality, Integrity, & Authentication
• Hashing
• Secret Key (Symmetric) cryptography
• Public Key (Asymmetric) cryptography
• Chain of Trust
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 33
Public Key Cryptography
AKA “Asymmetric” or “Public/Private Key” Cryptography
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 34
Public Key (Asymmetric) Cryptography
Bob Bob
Bob’s KPUB KPRIV
Public Key
Bob’s
Public and Private
Key Pair
Alice can provide Bob her public key in the same way
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 35
Asymmetric Authentication
Alice wants to authenticate she is connected to Bob
Alice and Bob know and trust each other and have their own public/private
key pairs
Alice Bob
01100…111011
Random Challenge 01100…111011
Digital
Verify Sign
Signature Bob
Bob’s KPRIV
Public Key
Bob’s
Private Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 36
What exactly is a Digital Signature?
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 37
More accurately,
a digital signing looks like this:
Alice Bob
01100…111011
Random Challenge 01100…111011
Digital
Verify Sign
Signature Bob
Bob’s KPRIV
Public Key
Bob’s
Private Key
Random number
(never shared)
Injecting randomness defeats this attack. Even if the same exact challenge is signed, a
completely different, yet verifiable, signature is calculated.
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 38
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 39
Agenda
• Why we need Security now
• Why Microchip for Security?
• Confidentiality, Integrity, & Authentication
• Hashing
• Secret Key (Symmetric) cryptography
• Public Key (Asymmetric) cryptography
• Chain of Trust
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 40
What if Alice and Bob don’t
know each other?
• Until now, we only considered Alice knows Bob
• We assumed Alice shared her public key with Bob and Bob knew,
without doubt, it belonged to Alice. And visa versa.
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 41
How are certificates used to establish trust?
Cartoon example using Bob’s mom as the Root of Trust
• Alice knows and trusts Bob’s mom but never met Bob
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 42
How are certificates used to establish trust?
Cartoon example using Bob’s mom as the Root of Trust
• Alice knows and trusts Bob’s mom but never met Bob
Thank you!
Hi Bob, I have a It’s good to
message from hear from
your mom. my mom!
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 43
Structure of a Certificate
Accepted PKI standard X.509 v3 digital certificate is as follows:
• Certificate Contents
• Version & Serial Number
See the following link for details:
• Algorithm ID
https://tools.ietf.org/html/rfc5280
• Issuer
• Validity
• Not Before / Not After
• Subject
• Subject Public Key Info
• Public Key Algorithm
• Subject Public Key
• Issuer Unique Identifier (optional)
• Subject Unique Identifier (optional)
• Extensions (optional)
• ...
• Certificate Signature Algorithm
• Digital Signature
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 44
How Certificates (Digitally Signing) are
used in a real world system
Asymmetrically authenticating ink cartridges, for example
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 45
The Provisioning Process (Factory Setup)
1
ECDSA Root of Trust
SIGN OEM OEM (OEM HQ or CA)
KPRIV KPUB
Licensed Authority Module
supplier
Ink cartridge
Crypto
Element Crypto Element
LS
LS LS Certificate
KPUB KPRIV
LS
3
KPUB
OEM
certificate
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 46
The Authentication Process (Customer use)
Ink Cartridge
Printer
Crypto Element
Crypto Element
OEM
Public Key
Verify Mfg
LS
KPUB 1
ECDSA KPUB
VERIFY OEM
Certificate
?
Verify Device
Device Device
Public Key
2
ECDSA KPUB KPRIV
VERIFY
?
RANDOM LS
CHALLENGE Certificate
3
Challenge -
Response -
ECDSA
Verify
VERIFY
ECDSA
SIGN
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 47
Limited use counters
Limits the number of uses
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 48
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 49
Creating a Signed Message
Bob wants assurance the file came from Alice and was not altered
The message Alice is sending to Bob is plaintext, not encrypted
Alice’s
Alice Private Key Sign
KPRIV Signature
Digital To Bob
Envelope
Plain Text Hash
Plain Text
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 50
Receiving a Signed Message
Bob wants assurance the file came from Alice and was not altered
The message Alice is sending to Bob is plaintext, not encrypted
Signature
From Verify
Alice Digital
Envelope
Plain Text
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 51
Achieving confidentiality with
Public Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 52
Sending an encrypted message using
public key
Alice wants to send Bob a secure message
Bob needs assurance the message came from Alice and is unaltered
Alice’s Sign
Alice Private Key
KPRIV Signature
Digital
Plain Text Hash
Envelope
To Bob
Encrypt
Session Cipher Text
Key
Bob’s Encrypt
Bob Public Key Encrypted
KPUB Session Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 53
Receiving an encrypted message
using public key
Bob needs assurance this message came from Alice and is unaltered
Verify
Signature
HASH
Plain Text
Decrypt
Encrypted Session Key
Session Key
Bob’s
Bob
KPRIV Private Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 54
Elliptic Curve Diffie–Hellman (ECDH)
anonymous key exchange
• ECDH
• Anonymous key agreement protocol allowing two parties, each with their
own public/private pairs, to establish a unique shared secret between them
Pr ▪ Pu = SS = Pr ▪ Pu
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 55
Sending an encrypted message using
Diffie-Hellman (1 of 4)
Alice wants to send Bob a secure message
Bob needs assurance the message came from Alice and is unaltered
Alice calculates the ECDH shared secret she has with Bob
Alice’s Bob’s
Private Key Public Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 56
Sending an encrypted message using
Diffie-Hellman (2 of 4)
Alice wants to send Bob a secure message
Bob needs assurance the message came from Alice and is unaltered
Alice’s SIGN
Alice Private Key Signature
KPRIV
Digital
HASH Envelope
To Bob
Plain Text
Encrypt
Cipher Text
SS
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 57
Sending an encrypted message using
Diffie-Hellman (3 of 4)
Alice wants to send Bob a secure message
Bob needs assurance the message came from Alice and is unaltered
Bob’s Alice’s
Private Key Public Key
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 58
Sending an encrypted message using
Diffie-Hellman (4 of 4)
Alice wants to send Bob a secure message
Bob needs assurance the message came from Alice and is unaltered
Verify
Signature
HASH
Digital Alice’s
Envelope Alice Public Key
From KPUB
Alice
Plain Text
Decrypt
Cipher Text
SS
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 59
With ECDH, “SS” is always the same
Shouldn’t we have different keys for every session?
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 60
With ECDH, “SS” is always the same
(Part two)
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 61
“Session Keys” used in communication
Alice Bob
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 62
https:// and TLS 1.2
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 63
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 64
How to Achieve Strong Security
Three critical elements
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 65
Microchip specific information
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 66
We offer the Requirements for Security
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 67
Faster in Hardware
ATECC508A versus Cortex® M0+ running at 48MHz
5000
milliseconds
4000
3000
2000
1000
0
ECC256 Keny Gen ECDSA Sign ECDSA Verify ECDHE Key Agree
ATECC508A Cortex M0+ @ 48MHz
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 68
Hardware Security Features
Microchip
Active Shield
• Advanced Multi-Level HW
Security
• Active shield over entire chip
• All memories internally encrypted
• Information independent execution
• Internal state consistency checking
• Power supply tamper protection
Standard uC, logic & memory
• Temperature lockouts
• Internal clock generation
• Secure test methods
• No die features can be identified
• No package or die identification
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 69
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 70
Secure Element Block Diagram
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 72
Microchip Devices to use
• Devices from varied groups supporting Security
• CPG – Secure Cortex® M4 devices
• CEC1x02 family
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 73
CEC1702
Enhanced Crypto MCU
CEC1702 • 48MHz Core
• DSP/FPU Extension
Up to 480KB
Cortex-M4F 32KHz Ext Osc • Embedded Trace Module
embedded SRAM
64KB
48 MHz
32 KHz Int Osc
Boot ROM
• Up to 480KByte SRAM
MCU DSP/FPU 48MHa PLL
128B Battery RAM
• 64KB Boot ROM
ETM
Quad SPI • Enhanced Security block
24ch-DMA AES (128-192-256)
• AES
controller
I2C Integrity Check • HASH
(SHA-1, SHA-2)
Secure boot • Public Key
150MHz Unique
TRNG ID
SPI • RSA & ECC
Matrix
PKI – RSA, ECC • Battery backed features
UART
• QuadSPI interface
1 QSPI 65 IOs
• Timers and PWM
LED
VBATT Pwr Planes Timers/PWMs
Registers
Fan control • Apple Home Kit example
5-ch 10-bit ADC
Tamper
• “Canned” solution
• Packages:
• WFBGA: 64, 84
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 74
ATSAML11 System Architecture AHB Masters
AHB Slaves
SAML11 Only
PORT PORT CRYA
Trust
NVM SERCOM TC OPAMP ADC
RAM
CTRL x3 x3 x3 12-bit
256B
PAC DMAC DSU
DAC CCL EVSYS AC PTC
10-bit x2 8 ch x2 100ch
1 HS USB Dev./Host
controller • High Speed USB + Phy
Integrity Check
w/ PHY Monitor (SHA)
Secure boot
• Camera interface
1 HS SDIO/SD/e.MMC
150MHz Unique
TRNG ID • Advanced Analog and PWM
Matrix
Memory Scrambling • Ethernet and Dual CAN-FD on
5 UART, 3 USART, SAM E70
2 SPI, 3 TWI
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 76
ATSAMD5/E5
Security - Features
• AES, ECC, SHA, RSA, DSA, TRNG for HW Encryption:
• True Random number Generator
• Higher security with 256bit AES
• 6 Different Mode of Operation
• Galois counter Mode (GCM)
• Electronic Code Book (ECB)
• .....
• Integrity check monitor
• Secure Hash Algorithm SHA1, SHA224 and SHA256
• RSA, DSA up to 5408bits
• ECC Elliptic Curves Cryptography up to 1504bits
• Deterministic Random Number Generation (DRNG ANSI X9.31) for DSA
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 77
Last slides
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 78
How did we do with the Class
Objectives?
• Upon completion of this class, you will be
able to:
• Explain hashing and its function in cryptography
• Explain Symmetric and Asymmetric Cryptography
• Explain the “Chain of trust”
• Explain ways of creating unique session keys
• Did we accomplish that?
• Please be generous with high marks on the survey
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 79
Feedback sheets
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 80
Thank you!
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 81
A Secure System Needs “CIA”
• Confidentiality / Privacy
• Assures no unintended entities may read data at rest and/or
messages during transmission
• Integrity
• Assures a message was not altered in any way
• Authentication
• Assures something is what it is declared to be
• Non-repudiation
• Assures a specific origin and/or sender’s identity
• Attestation / Secure Boot / Secure DFU
• Provides reliable evidence the existing code is genuine
• Local and/or Remote Attestation is possible
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 82
“AIC” – the priority of security
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 83
Choosing among the Devices
Use the ATSHA Use the ATAES
• Uses Symmetric (Secret) Key and Hashing • Uses Symmetric Key AES-CCM mode (CTR
with CBC-MAC) and Hashing
• Best when price is highest priority
• When compatibility with Serial EEPROM is
• Best for systems with two end points
desired
• Same secret on host and client • Up to 32 Kbits of data for fingerprints,
calibration data, firmware blocks, etc…
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 84
Available
MCU32 Legacy
SAM V70
SAM S70
SAM E70
SAM V71
1MB
SAM4N
SAM4E
SAM
SAME54
G55
G54
G53
SAMD51
SAM4S
SAM4L
SAM3X /A
512KB
SAM
G51
SAM L22
256KB
SAM L21
SAM C2x
SAM D21
SAM DA1
128KB
SAM D20
SAM3N
SAM3S
64KB
32KB
SAM D11
SAM D10
16KB
8KB
Crypto
<8KB
Mem 14- 32- 48- 14- 48- 48- 64- 100- 100- 64- 49- 48- 32- 48- 64- 64-
64 - 128 49-100 49-64 32-64 32-64
……Pin 20 64 100 64 100 128 144 144 144 144 100 100 64 100 144 144
Core CM0+ CM0+ CM3/4 CM0+ CM3/4 CM4F CM7 CM3 CM4F CM7 CM4F CM4F CM4F CM4F CM4 CM0+ CM0+ CM0+ CM7 CM7 CM0+
Freq.
48 48 80 48 120 120 300 84 120 300 120 48 48/96 120 48 48 32 48 300 300 48
MHz
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 85
LEGAL NOTICE
SOFTWARE:
You may use Microchip software exclusively with Microchip products. Further, use of Microchip software is subject to the copyright notices, disclaimers, and any license
terms accompanying such software, whether set forth at the install of each program or posted in a header or text file.
Notwithstanding the above, certain components of software offered by Microchip and 3rd parties may be covered by “open source” software licenses – which include
licenses that require that the distributor make the software available in source code format. To the extent required by such open source software licenses, the terms of
such license will govern.
MICROCHIP DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING ANY IMPLIED WARRANTIES OF NONINFRINGEMENT,
MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL MICROCHIP BE LIABLE FOR ANY DIRECT OR INDIRECT, SPECIAL,
PUNITIVE, INCIDENTAL, OR CONSEQUENTIAL LOSS, DAMAGE, COST, OR EXPENSE OF ANY KIND RELATED TO THESE MATERIALS OR ACCOMPANYING
INFORMATION PROVIDED TO YOU BY MICROCHIP OR OTHER THIRD PARTIES, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE POSSIBLITY OF SUCH
DAMAGES OR THE DAMAGES ARE FORESEEABLE. PLEASE BE AWARE THAT IMPLEMENTATION OF INTELLECTUAL PROPERTY PRESENTED HERE MAY
REQUIRE A LICENSE FROM THIRD PARTIES.
TRADEMARKS:
The Microchip name and logo, the Microchip logo, AnyRate, AVR, AVR logo, AVR Freaks, BitCloud, chipKIT, chipKIT logo, CryptoMemory, CryptoRF, dsPIC, FlashFlex,
flexPWR, Heldo, JukeBlox, KeeLoq, Kleer, LANCheck, LINK MD, maXStylus, maXTouch, MediaLB, megaAVR, MOST, MOST logo, MPLAB, OptoLyzer, PIC, picoPower,
PICSTART, PIC32 logo, Prochip Designer, QTouch, SAM-BA, SpyNIC, SST, SST Logo, SuperFlash, tinyAVR, UNI/O, and XMEGA are registered trademarks of Microchip
Technology Incorporated in the U.S.A. and other countries.
ClockWorks, The Embedded Control Solutions Company, EtherSynch, Hyper Speed Control, HyperLight Load, IntelliMOS, mTouch, Precision Edge, and Quiet-Wire are
registered trademarks of Microchip Technology Incorporated in the U.S.A.
Adjacent Key Suppression, AKS, Analog-for-the-Digital Age, Any Capacitor, AnyIn, AnyOut, BodyCom, CodeGuard, CryptoAuthentication, CryptoAutomotive,
CryptoCompanion, CryptoController, dsPICDEM, dsPICDEM.net, Dynamic Average Matching, DAM, ECAN, EtherGREEN, In-Circuit Serial Programming, ICSP, INICnet,
Inter-Chip Connectivity, JitterBlocker, KleerNet, KleerNet logo, memBrain, Mindi, MiWi, motorBench, MPASM, MPF, MPLAB Certified logo, MPLIB, MPLINK, MultiTRAK,
NetDetach, Omniscient Code Generation, PICDEM, PICDEM.net, PICkit, PICtail, PowerSmart, PureSilicon, QMatrix, REAL ICE, Ripple Blocker, SAM-ICE, Serial Quad I/O,
SMART-I.S., SQI, SuperSwitcher, SuperSwitcher II, Total Endurance, TSHARC, USBCheck, VariSense, ViewSpan, WiperLock, Wireless DNA, and ZENA are trademarks
of Microchip Technology Incorporated in the U.S.A. and other countries.
SQTP is a service mark of Microchip Technology Incorporated in the U.S.A.
Silicon Storage Technology is a registered trademark of Microchip Technology Inc. in other countries.
GestIC is a registered trademark of Microchip Technology Germany II GmbH & Co. KG, a subsidiary of Microchip Technology Inc., in other countries.
All other trademarks mentioned herein are property of their respective companies.
© 2018, Microchip Technology Incorporated, All Rights Reserved.
© 2018 Microchip Technology Incorporated. All Rights Reserved. 22070 SEC1 Slide 86