The Symmetric Cryptography command set is made of up of those commands associated with the
generation or use of Symmetric Keys. Keys are typically stored in Data zone slots, but
for some commands could also be in the SRAM memory locations.
Table 5-4. Symmetric Cryptography CommandsCommand Name | Description |
---|
AES | Execute the AES-ECB Encrypt or Decrypt functions. Calculate a
Galois Field Multiply. |
CheckMac | Verify a MAC calculated on another CryptoAuthentication™ device. |
GenDig | Generate a data digest from a random or input seed and a stored
value. |
KDF | Implement the PRF or HKDF key derivation functions |
MAC | Calculate digest (response) from key and other internal data
using SHA-256. |