5.2 Asymmetric Cryptography Commands
The Asymmetric Cryptography command set is made up of those commands that are specifically used to generate or use ECC keys. Keys are typically stored in Data zone slots, but, for some commands, could also be in the SRAM array.
Command Name | Description |
---|---|
ECDH | Generates an ECDH pre-master secret using the stored private key and input public key |
GenKey | Generates an ECC private key or optionally generates an ECC public key from the stored private key |
Sign | Signs an internal or external message digest using an ECC private key with an ECDSA signature calculation |
Verify | Verifies an internal or external message digest using an ECC public key with an ECDSA verify calculation |