The EFR32MG21 board features a QFN32 socket that matches the EFR32MG21A/B footprint from Silicon Labs. The EFR32MG21A/B device features a number of security features, including a dedicated “Secure Element” or “Secure Vault” core that performs a secure boot operation, and DPA countermeasures on cryptographic primitives.
The RF section is not broken out to a 50-ohm matched header, but instead a simple 3-pin header which allows potential usage in laboratory environments.
As this board contains a QFN socket, it is ideally suited for experiments such as template attacks, or potentially damaging attacks which require replacement of the main IC. In addition, this target can be easily shipped without restrictions as it does not contain any cryptographic functions (no IC at all is included).
This target requires an external programmer to reload code.
|Target Device||Not Included (fits EFR32MG21A010F1024 etc)|
|Target Architecture||Arm Cortex M33|
Break-out for various voltage rails, allowing over-driving of internal regulator to reduce noise for DPA measurements, or for testing fault injection detection capability.
EFR32MG21A (“Mighty Gecko Multiprotocol Wireless SoC”) has a high-performance Cortex M33 (TrustZone-M) with a seperate “secure element” core that handles the secure boot operation, along with multiple cryptographic accelerators (both AES and ECC) that include advertised DPA countermeasures.
The EFR32MG21B adds the "secure vault" feature.
A JTAG programmer is typically required for these devices.