JEDEC Standard No. 261
-i-
SERIAL NOR SECURITY HARDWARE ABSTRACTION LAYER
Contents
Pages
Foreword ...................................................................................................................................................... iii
Introduction .................................................................................................................................................. iii
1 Scope ....................................................................................................................................................... 1
2 Informative Reference ............................................................................................................................ 2
3 Terms and Definitions ............................................................................................................................. 3
4 Functional Overview ............................................................................................................................... 3
4.1 Security Profile Discovery Parameter .................................................................................................. 5
4.2 Cryptography Attributes ...................................................................................................................... 5
4.3 Functional Summary ............................................................................................................................ 6
4.4 Performance Expectations.................................................................................................................... 8
5 Device Lifecycle ..................................................................................................................................... 9
5.1 Security Provisioning ........................................................................................................................... 9
5.2 Security Deployment ........................................................................................................................... 9
5.3 Security Operation ............................................................................................................................... 9
5.3.1 Initialization Phase .......................................................................................................................... 10
5.3.2 Cryptographic Session Establishment/Termination Phase .............................................................. 11
5.3.3 Secure Region Management Phase ................................................................................................. 12
5.3.4 Cryptographic Session Functionality Phase .................................................................................... 13
6 Software Interfaces ............................................................................................................................... 15
6.1 Application Interface ......................................................................................................................... 15
6.1.1 Create Session ................................................................................................................................. 16
6.1.2 Terminate Session ........................................................................................................................... 17
6.1.3 Secure Erase .................................................................................................................................... 18
6.1.4 Secure Program ............................................................................................................................... 19
6.1.5 Secure Copy (Optional) .................................................................................................................. 20
6.1.6 Secure Init ....................................................................................................................................... 22
6.1.7 Secure Uninit .................................................................................................................................. 22
6.1.8 Secure Manage Region (Optional) .................................................................................................. 23
6.1.9 Secure Get Regions Info ................................................................................................................. 26
6.1.10 Secure Read (Optional) ................................................................................................................. 27
7 Implementation ..................................................................................................................................... 30
7.1 Create Session Sequence Diagram ..................................................................................................... 30
Downloaded by 65 56 (cdm_lj@163.com) on Nov 13, 2022, 11:58 pm PST
JEDEC