Getting started with STM32U3 security


Practical examples are proposed to provide an overview and to help to understand the STM32U3 security solution.
These examples are based on the board, tools, and codes provided by ST.
In the guides listed below, each step to follow is described in detail.
It is advised to get familiar with the available tools by using these examples before making your own developments.


Product Series STM32U3x
Board NUCLEO-U385RG-Q
OEMiRoT how to Link to article
CCB KW ECDSA Signature introduction article Link to article
CCB KW ECDSA Signature how to Link to article


The focus for the security of this product is on the secure boot and simple, but hardened protection of assets.
The platform security certifications are targeting SESIP3, which is a stand-out feature for such a small product.
Password protected regression is another differentiating feature of the STM32U3 series.

1. RDP regression

The important feature of the STM32U3 is the ability to lock regression from RDP1 to RDP0 using password and allow password-protected regression from RDP2 to RDP1.
Further reading:

2. OEMiRoT - Root of Trust

An OEM can develop its own customized Immutable Root of Trust (OEMiRoT).
The STM32CubeU3 provides examples configuration files, codes, data files and scripts.

3. CCB (Coupling and Chaining Bridge)

The Coupling and Chaining Bridge is a new feature introduced for this product.
It allows to avoid the access from the CPU to the private keys and some critical security operations done by hardware.

A tutorial is proposed showing how the private key wrapping is done, how the wrapped key is used and also how the public key is generated from this wrapped private key.