Original text


"Gh.Asachi" Technical University of Iasi - Fac. Automation and Computers
Embedded Computers
Wednesday, Feb. 10,
11:30 p.m.

 FRDN
Experiment no. 10

  • L10.1 Name:


  • ARM Cortex M4 - Interface with the Infineon Optiga trust E security circuit



  • L10.2 General presentation, purpose.

  • The degree of confidence in the correct functioning of a system essentially determines the level of acceptance by users (and society in general) of computing systems in infrastructures that control physical (eg, factories, cars) or computer (eg, banking institutions) systems. ), whose malfunction may lead to damage-causing events (ie, loss of value).

    Security can be addressed at all levels of the implementation of a computing system, from hardware components (eg, microprocessors) to software components (eg, operating system, applications).

    There are companies (ie, Infineon) that offer a wide range of security implementation solutions at the hardware level (eg, TPM circuits, cryptoprocessors) that can be integrated into ICT systems.

    The laboratory experiment aims to introduce the basic elements for the interface between a microcontroller and a circuit that provides security services Infineon Optiga Trust E that is connected to the myocrocontroller via the I2C bus

  • L10.3 Resources
  • - XMC4500 Relax Kit,;
    - DAVE 4.3.2;
    - Infineon Optiga Trust E ;
    - (optional) Saleae logic analyzer




  • L10.4 Prototype project source


  • Prototype project for obtaining random number sequences from the Optiga Trust E HINT! To access the resource on Google Drive you need to log in using your academic identity (@ academic.tuiasi.ro or @ student.tuiasi.ro)!

    Or use the main.c file and the settings below












  • L10.5 Mode of conducting / following the experiment

  • Analyze the XMC4500 Relax kit development platform diagram ;
  • Analyze the scheme of the S2Go Security OPTIGA E development platform;
  • Analyze the use of DAVE components for I2C communication with the Optiga Trust E security circuit. The figures below show two I2C communication waveforms that contain the command and response for generating a sequence of 16 random (byte) numbers.




  • L10.6 Proposed problems


  • 1. Make a program that will calculate the signature value of a message (string of bytes) using the SHA-256 algorithm implemented in the Optiga Trust E circuit. The message can be generated randomly.
    2. Create a program that will calculate the signature value of a message (string of bytes) using the Elliptic Curve Key on NIST P256 curve algorithm implemented in the Optiga Trust E circuit. The message can be generated randomly.
    3. Create a program that will allow you to generate a key pair (public and private) using the Optiga Trust E circuit
    4. Make a program that will allow you to encrypt and decrypt messages using the Optiga Trust E circuit
    5. Bring a function library to Dave security implemented at a high level (e.g.OPTIGA ™ Trust X Software Framework ), but which basically uses the services of the Optiga Trust E circuit.


  • L10.7 Documentary references:


  • © 2020 Fl. Pantilimonescu & A.Stan - Fac. Automation and Computers Iasi