English
Language : 

CC2520_11 Datasheet, PDF (49/133 Pages) Texas Instruments – 2.4 GHZ IEEE 802.15.4/ZIGBEE RF TRANSCEIVER
OPCODE
CTR
UCTR
CBCMAC
Inputs Outputs
p
k[7:0]
c[6:0]
n[7:0]
a[11:0]
e[11:0]
s[7:0]
p
k[7:0]
c[6:0]
n[7:0]
a[11:0]
e[11:0]
s[7:0]
p
k[7:0]
c[6:0]
a[11:0]
e[11:0]
m[2:0]
s[7:0]
CC2520 DATASHEET
2.4 GHZ IEEE 802.15.4/ZIGBEE® RF TRANSCEIVER
SWRS068 – DECEMBER 2007
Description
Encryption instruction using counter mode encryption.
Process C bytes of plaintext with a starting address at A
using the key stored at address (16⋅K), the counter
stored at address (16⋅N) storing the output starting at
address E.
The priority of the instruction is defined by P, which is
either low (if P=0) or high (if P=1).
If the destination address E provided in the instruction
equals zero, the destination address E is set equal to A,
thereby replacing the plaintext directly with the ciphertext
(or vice versa, in the case of an UCTR instruction).
The output is C encrypted bytes processed according to
802.15.4 standard for security level 4 (CTR).
A USAGE_ERROR exception is raised if an instruction is
already active with the requested priority level (high or
low).
A DPU_DONE_L or DPU_DONE_H exception is raised
when the operation completes, depending on the priority
of the instruction. This happens regardless of whether
the operation was successful or not.
Decryption instruction using CTR mode decryption.
This instruction is the same as CTR, since counter mode
encryption and decryption are symmetrical operations.
Possible exceptions
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
Authentication instruction using CBC-MAC security.
Process C bytes of plaintext starting at address A, using
the key stored at address (16⋅K), storing the output
T
T
starting at address E.
The priority of the instruction is defined by P, which is
either low (if P=0) or high (if P=1).
If the destination address E provided in the instruction
equals zero, the destination address E is set equal to (A
+ C), thereby writing the output directly following the
plaintext input data.
The output is 4, 8, or 16 bytes of integrity code for
instructions M[1:0] equals 1, 2, or 3 respectively. For
M[1:0]=0, no integrity code output is generated.
If M[2]=0, the plaintext data to be authenticated is
automatically prefixed with C, as used in IEEE 802.15.4-
2003.
If M[2]=1, the plaintext data is not prefixed with C. This
mode can be used for backwards compatibility with
existing systems.
A USAGE_ERROR exception is raised if an instruction is
already active with the requested priority level (high or
low).
A DPU_DONE_L or DPU_DONE_H exception is raised
when the operation completes, depending on the priority
of the instruction. This happens regardless of whether
the operation was successful or not.
MEMADDR_ERROR
USAGE_ERROR
DPU_DONE_L
DPU_DONE_H
OPERAND_ERROR
WWW.TI.COM
49