5.3 Symmetric Cryptography Commands

The Symmetric Cryptography command set is made of up of those commands associated with the generation or use of Symmetric Keys. Keys are typically stored in Data zone slots, but for some commands could also be in the SRAM memory locations.
Table 5-4. Symmetric Cryptography Commands
Command NameDescription
AESExecute the AES-ECB Encrypt or Decrypt functions. Calculate a Galois Field Multiply.
CheckMacVerify a MAC calculated on another CryptoAuthentication device.
GenDigGenerate a data digest from a random or input seed and a stored value.
KDFImplement the PRF or HKDF key derivation functions
MACCalculate digest (response) from key and other internal data using SHA-256.