You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/nrf/protocols/matter/end_product/security.rst
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ nRF54L with Trusted Firmware-M (TF-M)
26
26
27
27
On the nRF54L SoC, Matter samples support :ref:`app_boards_spe_nspe` with Trusted Firmware-M (TF-M).
28
28
All cryptographic operations within the Matter stack are performed by utilizing the `Platform Security Architecture (PSA)`_ API and executed in the secure TF-M environment.
29
-
The secure materials like Matter Session keys, DAC private key and other keys, are stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` module.
29
+
The secure materials like Matter Session keys and other keys, except for the DAC private key, are stored in the TF-M secure storage using the :ref:`tfm_encrypted_its` module.
30
30
Matter samples use the full TF-M library, so you cannot use the :ref:`tfm_minimal_build` version of TF-M.
31
31
32
32
To build a Matter sample with the TF-M support, :ref:`build <building>` for the :ref:`board target <app_boards_names>` with the ``/ns`` variant.
@@ -37,8 +37,8 @@ While using TF-M, the application partition size and available RAM space for the
37
37
You must keep this in mind and calculate the available space for the application partition.
38
38
The recommended values are provided in the :ref:`ug_matter_hw_requirements_layouts` section.
39
39
40
-
In addition, you can store the DAC private key in the KMU storage while using TF-M.
41
-
To learn how to do it, see the :ref:`matter_platforms_security_dac_priv_key_kmu` section.
40
+
By default, the DAC private key is stored in the KMU storage while using TF-M.
41
+
See the :ref:`matter_platforms_security_dac_priv_key_kmu` section for more information.
42
42
43
43
Cryptography
44
44
************
@@ -142,7 +142,7 @@ This is a reference configuration that can be modified in the production firmwar
142
142
- PSA Crypto API
143
143
- CRACEN
144
144
- Yes
145
-
- Trusted Firmware-M (TF-M)
145
+
- Trusted Firmware-M (TF-M) + Key Management Unit (KMU)
146
146
147
147
.. [1] The CryptoCell backend is used in parallel with the Oberon backend.
148
148
By default, the CryptoCell backend is used only for Random Number Generation (RNG) and the AEAD key derivation driver.
In Matter samples based on the PSA crypto API, the Device Attestation Certificate's private key, which exists in the factory data set, can be migrated to secure storage.
163
163
The secure storage used depends on the platform and the cryptographic backend.
164
164
165
-
To enable the migration of the DAC private key from the factory data set to secure storage, set the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_MIGRATE_DAC_PRIV_KEY` Kconfig option to ``y``.
165
+
The migration of the DAC private key from the factory data set to secure storage is controlled by the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_MIGRATE_DAC_PRIV_KEY` Kconfig option and set to ``y`` by default.
166
166
167
167
Currently, this feature is available only for the PSA crypto API.
168
168
See the following table to learn about the default secure storage backends for the DAC private key and the available secure storage backends for each platform:
@@ -185,12 +185,12 @@ See the following table to learn about the default secure storage backends for t
@@ -207,7 +207,7 @@ DAC in Trusted Storage library
207
207
208
208
The Device Attestation Certificates private key can be stored in the Trusted Storage library.
209
209
The key is encrypted with the AEAD key derived from the Hardware Unique Key (HUK) or a SHA-256 hash.
210
-
This storage backend is selected by default for all platforms that support the PSA crypto API.
210
+
This storage backend is selected by default for all platforms that support the PSA crypto API, except for the nRF54L Series, which uses Key Management Unit (KMU).
211
211
212
212
To enable storing the DAC private key in the Trusted Storage library, set the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_DAC_PRIV_KEY_ITS` Kconfig option to ``y``.
213
213
To select which encryption to use, set one of the following Kconfig options:
@@ -226,7 +226,7 @@ The Key Management Unit (KMU) is a hardware peripheral that provides secure stor
226
226
It is available in the nRF54L Series SoCs and can be used to store the DAC private key.
227
227
This storage backend can be used with Trusted Firmware-M (TF-M).
228
228
229
-
You can enable storing the DAC private key in the KMU by setting the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_DAC_PRIV_KEY_KMU` Kconfig option to ``y``.
229
+
Storing the DAC private key in the KMU is controlled by the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_DAC_PRIV_KEY_KMU` Kconfig option and set to ``y`` by default.
230
230
231
231
You can additionally encrypt the DAC private key in the KMU storage by setting the :kconfig:option:`CONFIG_CHIP_CRYPTO_PSA_DAC_PRIV_KEY_KMU_ENCRYPTED` Kconfig option to ``y``.
232
232
This operation requires two additional KMU slots to store the nonce and the authentication tag, making the total number of slots used four.
0 commit comments