Difference between revisions of "Atmel Sam Cryptography with CryptoAuth-Xpro-B"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 9: Line 9:


== Description ==
== Description ==
The Cryptoauth expansion board contains four chips which gets connected via I2C
Chips:
* [https://www.microchip.com/wwwproducts/en/atsha204a ATSHA204A] (SHA256)
* [https://www.microchip.com/wwwproducts/en/atecc508a ATECC508A] (Ellipticcurve P256, SHA256)
* [https://www.microchip.com/wwwproducts/en/atecc608a ATECC608A] (Ellipticcurve P256, SHA256, AES-GCM)
* [https://www.microchip.com/wwwproducts/en/ataes132a ATAES132A] (AES128)


The [https://git.fh-campuswien.ac.at/c1710475053/atmel-sam-cryptography-with-cryptoauth-xpro-b Implemtation] is based on the [https://github.com/MicrochipTech/cryptoauthlib Cryptoauthlib]
=== Implementation for ATECCx08A and ATSHA204A ===
The [https://git.fh-campuswien.ac.at/c1710475053/atmel-sam-cryptography-with-cryptoauth-xpro-b implementation for ATECCx08A and ATSHA204A] is based on the [https://github.com/MicrochipTech/cryptoauthlib Cryptoauthlib].
 
* For ease of use of the ASF USART a custom abstraction layer got implemented.
The example program Implements:
* Showing the serial numbers of the chips
* Hashing a message
* Showing locked zones
* Locking zones
* Generate a random number (only works with locked configuration Zone)
* Generate a keypair (only works with locked configuration Zone)


== Cryptographic algorithms ==
== Cryptographic algorithms ==

Revision as of 07:10, 15 June 2019

Summary

This documentation describes the usage of security features for microcontrollers especially for the Atmel Sam R21 with the expansion board Atcryptoauth Xpro B.

Requirements

Description

The Cryptoauth expansion board contains four chips which gets connected via I2C Chips:

Implementation for ATECCx08A and ATSHA204A

The implementation for ATECCx08A and ATSHA204A is based on the Cryptoauthlib.

  • For ease of use of the ASF USART a custom abstraction layer got implemented.

The example program Implements:

  • Showing the serial numbers of the chips
  • Hashing a message
  • Showing locked zones
  • Locking zones
  • Generate a random number (only works with locked configuration Zone)
  • Generate a keypair (only works with locked configuration Zone)

Cryptographic algorithms

Comming Soon

Used Hardware

Courses

References

Implmentation:

Cryptographic algorithms: