DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

AT88SC6416CRF-MR1 View Datasheet(PDF) - Atmel Corporation

Part Name
Description
Manufacturer
AT88SC6416CRF-MR1
Atmel
Atmel Corporation 
AT88SC6416CRF-MR1 Datasheet PDF : 158 Pages
First Prev 121 122 123 124 125 126 127 128 129 130 Next Last
K.8.
Encryption Activation
Authentication Activation must be performed prior to Encryption Activation. The Mutual Authentication is performed in
steps 1 thru 7, and Encryption Activation in steps 8 thru 11 of the following procedure.
1. The Host reads the PICC ID from Nc (or another equivalent memory location) and calculates the diversified key
matching the PICC Secret Seed G. G = F1(K, ID, x, y, z)
2. The Host reads AACi and Ci from card.
3. The Host generates a Random Number QA and calculates challenge CHA and other parameters with the
cryptographic engine: [CHA, CA, SA] = F2(G, C, QA)
4. The Host Sends Verify Crypto Command with Key Index $0i: Verify Crypto ($0i, QA, CHA)
5. The PICC calculates challenge CH and other parameters using QA from the host with the cryptographic engine:
[CH, CiA, SiA] = F2(Gi, Ci, QA)
6. The PICC compares the internally calculated challenge CH to the value received from the host. If CH = CHA then
the host is authenticated and the card writes the calculated values of CiA to the Ci register and SiA to the Si
register. The AACi is cleared, Authentication Communication Security mode is activated, and an ACK response is
returned to the host.
7. The Host reads the new AACi and CiA from Ci register of the PICC and compares it to the calculated CA from step
3. If CA = CiA then the card is authenticated. The Mutual Authentication procedure is complete.
8. The Host generates a Random Number QE and calculates challenge CHE and other parameters with the
cryptographic engine: [CHE, CE] = F2(SiA, CiA, QE)
9. The Host Sends Verify Crypto Command with Key Index $1i: Verify Crypto ($1i, QE, CHE)
10. The PICC calculates challenge CH and other parameters using QE from the host with the cryptographic engine:
[CH, CiE] = F2(SiA, CiA, QE)
11. The PICC compares the internally calculated challenge CH to the value received from the host. If CH = CHE then
the host is authenticated and the card writes the calculated value of CiE to the Ci register. The AACi is cleared,
Encryption Communication Security mode is activated, and an ACK response is returned to the host.
The Secret Seed Gi value in the PICC never changes after it is locked at personalization. The AACi, and Ci registers
are written (by the PICC) each time a Verify Crypto command is received by the PICC. The Si register is written (by the
PICC) each time the Mutual Authentication procedure succeeds.
If the Host receives a NACK response from the PICC, then the Mutual Authentication procedure can be retried starting
with step 2.
Figure 35 shows the Authentication Activation procedure as a flowchart. Figure 39 shows the Encryption Activation
procedure as a flowchart.
122 AT88SC0808/1616/3216/6416CRF, AT88RF04C
5276C–RFID–3/09

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]