4.2 Asymmetric Cryptography Commands

The Asymmetric Cryptography command set is made up of those commands that are specifically used to generate or use ECC keys. Keys are typically stored in Data zone slots, but, for some commands, could also be in the SRAM array.

Table 4-3. Asymmetric Cryptography Commands
Command NameDescription
ECDHGenerates an ECDH pre-master secret using the stored private key and input public key
GenKeyGenerates an ECC private key or optionally generates an ECC public key from the stored private key
SignSigns an internal or external message digest using an ECC private key with an ECDSA signature calculation
VerifyVerifies an internal or external message digest using an ECC public key with an ECDSA verify calculation