4.3 Symmetric Cryptography Commands

The Symmetric Cryptography command set is made of up of those commands associated with the generation or use of Symmetric Keys. Keys are typically stored in Data zone slots, but for some commands could also be in the SRAM memory locations.
Table 4-4. Symmetric Cryptography Commands
Command NameOpcodeDescription
AES0x51Execute the AES-ECB Encrypt or Decrypt functions. Calculate a Galois Field Multiply.
CheckMac0x28Verify a MAC calculated on another CryptoAuthentication device.
GenDig0x15Generate a data digest from a random or input seed and a stored value.
KDF0x56Implement the PRF or HKDF key derivation functions
MAC0x08Calculate digest (response) from key and other internal data using SHA-256.