Contents
Introduction
Features
Applications
1. Pin Configuration and Pinouts
2. EEPROM Memory and Data Zone Access Policies
2.1. ATECC608A-TNGLoRaWAN Configuration Zone
2.1.1. Modifiable Configuration Zone Bytes
2.2. Data Zone and Access Policies
2.2.1. Data Zone Data Types
2.2.1.1. AES Key Storage
2.2.1.2. IEEE EUI-64 Identifier
2.2.1.3. Repersonalization Key
2.2.1.4. Nonce Values
2.2.1.5. Private Keys
2.2.1.6. ECC Public Keys
2.2.1.7. Certificates Dynamic Storage
2.2.1.8. I/O Protection Key
2.2.1.9. General Data Storage
2.2.2. Slot Configuration Terminology
2.2.3. ATECC608A-TNGLoRaWAN Slot Configuration Summary
2.2.4. ATECC608A-TNGLoRaWAN Detailed Slot Access Policies
2.3. ATECC608A-TNGLoRaWAN EEPROM One-Time Programmable (OTP) Zone
3. Static RAM (SRAM) Memory
4. General Command Information
4.1. I/O Transactions
4.2. Command Packets
4.3. Status/Error Codes
4.4. Address Encoding
4.4.1. Configuration Zone Addressing
4.4.2. OTP Zone Addressing
4.4.3. DataZone Addressing
4.5. Formatting of Keys, Signatures and Certificates
4.5.1. ECC Key Formatting
4.5.1.1. Public Key Formats
4.5.2. Signature Format
4.5.3. Certificate Storage
5. Device Commands
5.1. General Device Commands
5.1.1. Counter Command
5.1.2. Info Command
5.1.2.1. Info - Revision
5.1.2.2. Info - Device State
5.1.3. Lock Command
5.1.3.1. SlotLock
5.1.4. Nonce Command
5.1.4.1. Nonce - Random
5.1.4.2. Nonce - Fixed
5.1.5. Random Command
5.1.6. Read Command
5.1.6.1. Clear Text Read
5.1.6.2. Encrypted Read
5.1.7. SelfTest Command
5.1.8. SHA Command
5.1.8.1. SHA - SHA256 Digest
5.1.8.2. SHA - HMAC Digest
5.1.8.3. SHA - Context Switching
5.1.9. UpdateExtra Command
5.1.10. Write Command
5.1.10.1. Data Zone - Clear Text Write
5.1.10.2. Data Zone - Encrypted Write
5.2. Asymmetric Cryptography Commands
5.2.1. ECDH Command
5.2.1.1. ECDH - Stored Key
5.2.1.2. ECDH - TempKey Source
5.2.2. GenKey Command
5.2.2.1. Private Key - Stored in TempKey
5.2.2.2. Public Key Generation
5.2.2.3. Public Key Digest Generation
5.2.3. Sign Command
5.2.3.1. Sign - External Message
5.2.4. Verify Command
5.2.4.1. Verify - External Public Key Mode
5.2.4.2. Verify - Stored Public Key Mode
5.3. Symmetric Cryptography Commands
5.3.1. AES Command
5.3.1.1. AES-ECB Encrypt
5.3.1.2. AES-GFM
5.3.2. CheckMac Command
5.3.3. DeriveKey Command
5.3.4. GenDig Command
5.3.4.1. GenDig - Config
5.3.4.2. GenDig - OTP
5.3.4.3. GenDig - Data
5.3.4.4. GenDig - Shared Nonce
5.3.4.5. GenDig - Counter
5.3.4.6. GenDig - Key Config
5.3.5. KDF Command
5.3.6. MAC Command
5.3.6.1. Non-Diversified MAC
5.3.6.2. Diversified MAC
6. Application Information
7. I2C Interface
7.1. I/O Conditions
7.1.1. Device is Asleep
7.1.2. Device is Awake
7.2. I2C Transmission to ATECC608A-TNGLoRaWAN
7.2.1. Word Address Values
7.2.2. I2C Synchronization
7.3. Sleep Sequence
7.4. Idle Sequence
7.5. I2C Transmission from the ATECC608A-TNGLoRaWAN
8. Electrical Characteristics
8.1. Absolute Maximum Ratings
8.2. Reliability
8.3. AC Parameters: All I/O Interfaces
8.3.1. AC Parameters: I2C Interface
8.4. DC Parameters: All I/O Interfaces
8.4.1. VIH and VIL Specifications
9. Package Drawings
9.1. Package Marking Information
9.2. 8-pad UDFN
9.3. 8-lead SOIC
10. Revision History
The Microchip Website
Product Change Notification Service
Customer Support
Product Identification System
Microchip Devices Code Protection Feature
Legal Notice
Trademarks
Quality Management System
Worldwide Sales and Service