User Manual
Jennic
JennicJennic
Jennic
28 JN-DS-JN5139 v1.5 © Jennic 2008
Some protocols (for example ZigBee) require that security operations can be performed on buffered data rather than
in-line. A hardware implementation of the encryption engine significantly speeds up the processing of the contents of
these buffers. The Security Coprocessor can be accessed through software to allow the contents of memory buffers
to be transformed. Information such as the type of security operation to be performed and the encrypt/decrypt key to
be used must also be provided.
Processor
Interface
In-line
Interface
Arbiter
AES
Block
Encrpytion
Controller
AES
Encoder
Key Generation
Figure 20: Security Coprocessor Architecture










