English
Language : 

CC2520_15 Datasheet, PDF (48/134 Pages) Texas Instruments – 2.4 GHZ IEEE 802.15.4/ZIGBEE® RF TRANSCEIVER
CC2520 DATASHEET
2.4 GHZ IEEE 802.15.4/ZIGBEE® RF TRANSCEIVER
SWRS068 – DECEMBER 2007
OPCODE
INC
ECB
ECBO
ECBX
Inputs Outputs
p
s[7:0]
c[1:0]
a[11:0]
p
k[7:0]
c[3:0]
a[11:0]
e[11:0]
s[7:0]
p
k[7:0]
c[3:0]
a[11:0]
s[7:0]
p
k[7:0]
c[3:0]
a[11:0]
e[11:0]
s[7:0]
Description
Possible exceptions
Security instructions
Increment the 2C byte word with least significant byte at
address A. The nth least significant byte beyond the least
is located at address (A+n). (n’ < n means n’ has less
significance than n)
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
C shall be in the range 0 through 2, i.e. 1, 2 or 4 bytes
are incremented. If C equals 3, a USAGE_ERROR
exception shall be raised.
The priority of the instruction is defined by P, which is
either low (if P=0) or high (if P=1).
A USAGE_ERROR exception is raised if an instruction is
already active with the requested priority level (high or
low).
A DPU_DONE_L or DPU_DONE_H exception is raised
when the operation completes, depending on the priority
of the instruction. This happens regardless of whether
the operation was successful or not.
The instruction will always access 4 bytes regardless of
the C parameter, so a MEMADDR_ERROR exception is
raised if A > 0x3FC.
ECB encryption. Encrypt one 16 byte block of plaintext
consisting of (16-C) bytes of data read from memory,
starting at address A, concatenated with C zero-bytes,
using the key stored at address (16⋅K) and storing the
output at address E.
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
The priority of the instruction is defined by P, which is
either low (if P=0) or high (if P=1).
The output is 16 AES-128 encrypted bytes.
A USAGE_ERROR exception is raised if an instruction is
already active with the requested priority level (high or
low).
A DPU_DONE_L or DPU_DONE_H exception is raised
when the operation completes, depending on the priority
of the instruction. This happens regardless of whether
the operation was successful or not.
ECB encryption. Encrypt one 16 byte block of plaintext
consisting of (16-C) bytes of data read from memory,
starting at address A, concatenated with C zero-bytes,
using the key stored at address (16⋅K) and storing the
output by overwriting the data from address A.
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
The priority of the instruction is defined by P, which is
either low (if P=0) or high (if P=1).
The output is 16 AES-128 encrypted bytes.
A USAGE_ERROR exception is raised if an instruction is
already active with the requested priority level (high or
low).
A DPU_DONE_L or DPU_DONE_H exception is raised
when the operation completes, depending on the priority
of the instruction. This happens regardless of whether
the operation was successful or not.
ECB encryption and XOR. As ECB except each
ciphertext byte is bitwise XOR’ed with the existing byte in
the destination address E before it is written to that
address.
USAGE_ERROR
MEMADDR_ERROR
DPU_DONE_L
DPU_DONE_H
48
WWW.TI.COM