5 Device Commands

The following section details all of the commands broken out by Command mode that are allowed in the ATECC608B-TNGTLS. The commands have been broken into three categories:
  1. General Device Commands
    These commands fall into two categories:
    • General device access commands that are used to send data to the device or retrieve data but typically do not perform any cryptographic functions.
    • General cryptographic commands that can be used by the device or the system but typically do not operate on specific data slots.
  2. Asymmetric Cryptography Commands

    These commands perform asymmetric cryptographic operations, such as key generation, message signing and message verification that utilize an ECC public or private key. These commands are limited to use on ECC Data zone slots.

  3. Symmetric Cryptography Commands

    These commands perform a symmetric cryptographic function, such as generating a digest or MAC, key derivation or AES encryption and decryption.

Input Parameters for all Commands

Multibyte input parameters are shown as big-endian (MSB first) values in the input parameters tables unless otherwise specified. Note that the ATECC608B-TNGTLS device actually expects the data to be sent little-endian (LSB first).

Table 5-1. Commands, Descriptions and Command Categories
CommandDescriptionCommand Category
AESExecute the AES-ECB Encrypt or Decrypt functions. Calculate a Galois Field Multiply.Symmetric Cryptography Command
CheckMacVerify a MAC calculated on another CryptoAuthentication device.Symmetric Cryptography Command
CounterRead or increment one of the monotonic countersGeneral Device Commands
ECDHGenerate an ECDH pre-master secret using stored private key and input public key.Asymmetric Cryptography Command
GenDigGenerate a data digest from a random or input seed and a stored value.Symmetric Cryptography Command
GenKeyGenerate an ECC public key. Optionally generate an ECC private key.Asymmetric Cryptography Command
InfoReturn device state information.General Device Commands
KDFImplement the PRF or HKDF key derivation functionsSymmetric Cryptography Command
LockPrevent further modifications to a zone or slot of the device.General Device Commands
MACCalculate digest (response) from key and other internal data using SHA-256.Symmetric Cryptography Command
NonceGenerate a 32-byte random number and an internally stored Nonce.General Device Commands
RandomGenerate a random number.General Device Commands
ReadRead 4 or 32 bytes from the device, with or without authentication and encryption.General Device Commands
SelfTestTest the various internal cryptographic computation elementsGeneral Device Commands
SignECDSA signature calculation.Asymmetric Cryptography Command
SHACompute a SHA-256 or HMAC digest for general purpose use by the system.General Device Commands
UpdateExtraUpdate bytes 84 or 85 within the Configuration zone after the Configuration zone is locked.General Device Commands
VerifyECDSA verify calculation.Asymmetric Cryptography Command
WriteWrite 4 or 32 bytes to the device, with or without authentication and encryption.General Device Commands