Asymmetric Cryptography Commands

The Asymmetric Cryptography command set is made up of those commands that are specifically used to generate or use ECC keys. Keys are typically stored in Data zone slots, but, for some commands, could also be in the SRAM array.

Table 1. Asymmetric Cryptography Commands
Command Name Description
ECDH Generates an ECDH pre-master secret using the stored private key and input public key
GenKey Generates an ECC private key or optionally generates an ECC public key from the stored private key
Sign Signs an internal or external message digest using an ECC private key with an ECDSA signature calculation
Verify Verifies an internal or external message digest using an ECC public key with an ECDSA verify calculation