CryptoAuthentication SOIC Xplained Pro Starter Kit (DM320109)
Jump to navigation
Jump to search
Summary
!!!! W O R K I N P R O G R E S S !!!!
This documentation describes the usage of the CryptoAuthentication SOIC Xplained Pro Starter Kit (DM320109)
Requirements
Description
The CryptoAuthentication SOIC Xplained Pro Starter Kit (DM320109) consists of:
- ATSAMD21-XPRO
- AT88CKSCKTSOIC-XPRO
- 3 ATECC608A (Elliptic Curve Diffie Hellman, Elliptic Curve Digital Signature Algorithm, SHA-256 & HMAC, AES-128)
- 3 ATECC508A (Elliptic Curve Diffie Hellman, Elliptic Curve Digital Signature Algorithm, SHA-256 & HMAC)
- 3 ATAES132A (AES-128)
- 3 ATSHA204A (SHA-256 with MAC)
Implementation of ATSHA204A
An example implementation for the ATSHA204A can be found under Philly's Tutorial ATSHA204A - A Full Tutorial [1]
The example program implements:
- Device Details like serial number, device number, lock config
- Locking the configuration, OTP and Data Zone
- HMAC challenge
- GenDig example
- Read encrypted slots
- Creating diversified keys for challenges
- CheckMac
- DeriveKey
Usage:
- The program code can be found on Phil's website: DemoProject
- Download the code and open it in Microchip Studio, build it and flash it onto your DM320109 board
- To flash the code connect your DM320109 board with the USB cable at the USB EDBG port and your PC
- Open a terminal program like TeraTerm Tera Term Download
- Terminal / Tera Term port setup:
Port according to your device manager e.g. COM3 Speed 9600 Data 8 bit Parity none Stop bits 1 bit Flow control none
- Press then the reset button on your DM320109 board and in the Tera Term terminal the menu of the program will appear
- You can navigate through the different implementations via the menu
- To get details like serial number about the device select (01). If your ATSHA204A is connected correctly, you should see similar information as follows:
- To configure the device, write all the keys to the slots and lock the device, you have to follow the below steps:
- Step 1 - configure the device - command (03) Personalize Device
- Step 2 - lock the configuration zone - command (04)
- Step 3 - write to the OTP zone - command (05)
- Step 4 - write the keys - command (06)
- Step 5 - lock OTP and data zones - command (07)
- Step 6 - read OTP zones - command (08)
- Step 7 - run deriveKey for slot 5 - command (AB)
- Step 8 - run deriveKey (Key Roll) for slot 4 - command (AE)
- Step 9 - validate key - command (AA)
- When selecting (02) you get the slot configuration which is saved in bytes 20 - 51 within the 88 bytes configuration zone. There you have 16 slots of each 2 bytes containing the access restriction values for the slots in the data zone
- To interpret the slot configuration as displayed above the overview below will give useful information. More details can be found in the ATSHA204A data sheet.
Implementation for XXXX
.... TO BE COMPLETED ....
User Guides and Data Sheets
Used Software and Hardware
The links for the used software Microchip Studio and the used hardware CryptoAuthentication SOIC Xplained Pro Starter Kit (DM320109) and its microchips can be found at the beginning of this article under "requirements" and "description".
Courses
References
Implementation:
Hash and Cryptographic Algorithms: