Contents
Introduction
Features
Applications
1. Pin Configuration and Pinouts
2. EEPROM Memory and Data Zone Access Policies
2.1. ATECC608B-TNGTLS Configuration Zone
2.1.1. Modifiable Configuration Zone Bytes
2.2. Data Zone and Access Policies
2.2.1. Data Zone Data Types
2.2.1.1. Private Keys
2.2.1.2. Certificate Storage
2.2.1.3. AES Key Storage
2.2.1.4. I/O Protection Key
2.2.1.5. MAC Address
2.2.1.6. General Data Storage
2.2.2. Slot Configuration Terminology
2.2.3. ATECC608B-TNGTLS Slot Configuration Summary
2.2.4. ATECC608B-TNGTLS Detailed Slot Access Policies
2.3. ATECC608B-TNGTLS EEPROM One Time Programmable (OTP) Zone
3. Static RAM (SRAM) Memory
4. General Command Information
4.1. I/O Transactions
4.2. Command Packets
4.3. Status/Error Codes
4.4. Address Encoding
4.4.1. Configuration Zone Addressing
4.4.2. OTP Zone Addressing
4.4.3. DataZone Addressing
4.5. Formatting of Keys, Signatures and Certificates
4.5.1. ECC Key Formatting
4.5.1.1. Public Key Formats
4.5.2. Signature Format
4.5.3. Certificate Storage
5. Device Commands
5.1. General Device Commands
5.1.1. Counter Command
5.1.2. Info Command
5.1.2.1. Info - Revision
5.1.2.2. Info - KeyValid
5.1.2.3. Info - Device State
5.1.3. Lock Command
5.1.3.1. SlotLock
5.1.4. Nonce Command
5.1.4.1. Nonce - Random
5.1.4.2. Nonce - Fixed
5.1.5. Random Command
5.1.6. Read Command
5.1.6.1. Clear Text Read
5.1.7. SelfTest Command
5.1.8. SHA Command
5.1.8.1. SHA - SHA256 Digest
5.1.8.2. SHA - HMAC Digest
5.1.8.3. SHA - Context Switching
5.1.9. UpdateExtra Command
5.1.10. Write Command
5.1.10.1. Data Zone - Clear Text Write
5.2. Asymmetric Cryptography Commands
5.2.1. ECDH Command
5.2.1.1. ECDH - Stored Key
5.2.1.2. ECDH - TempKey Source
5.2.2. GenKey Command
5.2.2.1. Private Key - Stored in Slot
5.2.2.2. Private Key - Stored in TempKey
5.2.2.3. Public Key Generation
5.2.2.4. Public Key Digest Generation
5.2.3. Sign Command
5.2.3.1. Sign - Internal Message
5.2.3.2. Sign - External Message
5.2.4. Verify Command
5.2.4.1. Verify - External Public Key Mode
5.2.4.2. Verify - Stored Public Key Mode
5.3. Symmetric Cryptography Commands
5.3.1. AES Command
5.3.1.1. AES-ECB Encrypt
5.3.1.2. AES-ECB Decrypt
5.3.1.3. AES-GFM
5.3.2. CheckMac Command
5.3.3. GenDig Command
5.3.3.1. GenDig - Config
5.3.3.2. GenDig - OTP
5.3.3.3. GenDig - Data
5.3.3.4. GenDig - Shared Nonce
5.3.3.5. GenDig - Counter
5.3.3.6. GenDig - Key Config
5.3.4. KDF Command
5.3.5. MAC Command
5.3.5.1. Non-Diversified MAC
5.3.5.2. Diversified MAC
6. Application Information
6.1. Use Cases
6.2. Development Tools
6.2.1. Trust Platform Design Suite
6.2.2. Hardware Tools
6.2.3. CryptoAuthLib
6.3. TrustFLEX vs. Trust&GO
7. I2C Interface
7.1. I/O Conditions
7.1.1. Device is Asleep
7.1.2. Device is Awake
7.2. I2C Transmission to ATECC608B-TNGTLS
7.2.1. Word Address Values
7.2.2. I2C Synchronization
7.3. Sleep Sequence
7.4. Idle Sequence
7.5. I2C Transmission from the ATECC608B-TNGTLS
8. Electrical Characteristics
8.1. Absolute Maximum Ratings
8.2. Reliability
8.3. AC Parameters: All I/O Interfaces
8.3.1. AC Parameters: I2C Interface
8.4. DC Parameters: All I/O Interfaces
8.4.1. VIH and VIL Specifications
9. Compatibility
10. Package Drawings
10.1. Package Marking Information
10.2. 8-pad UDFN
10.3. 8-lead SOIC
11. Revision History
The Microchip Website
Product Change Notification Service
Customer Support
Product Identification System
Microchip Devices Code Protection Feature
Legal Notice
Trademarks
Quality Management System
Worldwide Sales and Service