1.1 Use Cases
SHA105 is a member of the Microchip CryptoAuthentication family of high-security cryptographic devices that combine world-class hardware-based key storage with hardware cryptographic accelerators to implement authentication.
SHA105 has a command set that allows for its usage in multiple symmetric key applications where a host side device is required. The SHA105 will perform a CheckMAC operation to validate the MAC that was executed on the SHA104-TFLXAUTH or other client side device. The primary uses include the following:
- Accessory/Disposable Authentication
- Shared Key authentication – Requires integrating a SHA104 on the accessory/disposable and a SHA105 on the host side – both Secure Element will be provisioned with the same symmetric key.
- Diversified Key authentication – Requires integrating a SHA104 on the accessory/disposable and a SHA105 on the host side. SHA104 will be provisioned with a unique symmetric key derived from a root symmetric key and the SHA104 unique serial number. SHA105 will be provisioned with the root symmetric key.