5.3 Symmetric Cryptography Commands
The Symmetric Cryptography command set is made of up of those commands associated with the generation or use of symmetric keys. Keys are typically stored in Data zone slots, but for some commands, keys could also be generated and stored in some SRAM memory locations.
Command Name | Opcode | Description |
---|---|---|
AES | 0x51 | Execute the AES-ECB Encrypt or Decrypt functions. Calculate a Galois Field Multiply. |
CheckMac | 0x28 | Verify a MAC calculated on another CryptoAuthentication device. |
DeriveKey | 0x1C | Derive a target key value from the target or parent key. |
GenDig | 0x15 | Generate a data digest from a random or input seed and a stored value. |
KDF | 0x56 | Implement the PRF, AES or HKDF key derivation functions |
MAC | 0x08 | Calculate digest (response) from key and other internal data using SHA-256. |