English
Language : 

TSC80251G2D Datasheet, PDF (41/76 Pages) ATMEL Corporation – B/16-BIT MICROCONTROLLER WITH SERIAL COMMUNICATION INTERFACES
Lock Bit System
Encryption Array
AT/TSC8x251G2D
The TSC87251G2D products implement 3 levels of security for User’s program as
described in Table 33. The TSC83251G2D products implement only the first level of
security.
Level 0 is the level of an erased part and does not enable any security features.
Level 1 locks the programming of the User’s internal Code Memory, the Configuration
Bytes and the Encryption Array.
Level 2 locks the verifying of the User’s internal Code Memory. It is always possible to
verify the Configuration Bytes and the Lock Bits. It is not possible to verify the Encryp-
tion Array.
Level 3 locks the external execution.
Table 33. Lock Bits Programming
Level
Lock bits
LB[2:0]
Internal
Execution
External
Execution
Verification
Programming
External
PROM read
(MOVC)
0
000
Enable
Enable
Enable(1)
Enable
Enable(2)
1
001
Enable
Enable
Enable(1)
Disable
Disable
2
01x(3)
Enable
Enable
Disable
Disable
Disable
3
1xx(3)
Enable
Disable
Disable
Disable
Disable
Notes:
1. Returns encrypted data if Encryption Array is programmed.
2. Returns non encrypted data.
3. x means don’t care. Level 2 always enables level 1, and level 3 always enables levels
1 and 2.
The security level may be verified according to Table 34.
Table 34. Lock Bits Verifying
Level
0
1
2
3
Note: 1. x means don’t care.
Lock bits Data(1)
xxxxx000
xxxxx001
xxxxx01x
xxxxx1xx
The TSC83251G2D and TSC87251G2D products include a 128-byte Encryption Array
located in non-volatile memory outside the memory address space. During verification
of the on-chip code memory, the seven low-order address bits also address the Encryp-
tion Array. As the byte of the code memory is read, it is exclusive-NOR’ed (XNOR) with
the key byte from the Encryption Array. If the Encryption Array is not programmed (still
all 1s), the user program code is placed on the data bus in its original, unencrypted form.
If the Encryption Array is programmed with key bytes, the user program code is
encrypted and cannot be used without knowledge of the key byte sequence.
41
4135D–8051–08/05