P5DF081HN/T1AD2060 NXP Semiconductors, P5DF081HN/T1AD2060 Datasheet - Page 14

no-image

P5DF081HN/T1AD2060

Manufacturer Part Number
P5DF081HN/T1AD2060
Description
P5DF081HN/HVQFN32/REEL13//T1AD
Manufacturer
NXP Semiconductors
Series
MIFARE®r
Datasheet

Specifications of P5DF081HN/T1AD2060

Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
NXP Semiconductors
Table 6.
P5DF081_SDS
Objective short data sheet
PUBLIC
Command
SAM_IsoGetChallenge/
SAM_GetRandom
SAM_IsoExternalAuthen
ticate
SAM_IsoInternalAuthent
icate
SAM_GetVersion
SAM_Sleep
SAM security and configuration commands
Description
AV1 compatibility mode
In AV1 compatibility mode, this is the first part of an ISO compliant authentication sequence
returning a random number. The command can obviously also be used for simply generating a
random number but it has to be taken into account that the MIFARE SAM AV2 internally is set into
a state indicating that an authentication procedure is ongoing, if the requested random number
length is 8 byte or 16 byte. Consequently, the command called after getting the random number
will be aborted (except SAM_IsoExternalAuthenticate). After this abortion the MIFARE SAM AV2
resets its state and returns to normal operation.
For a complete and valid authentication procedure, the three commands SAM_IsoGetChallenge,
SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate have to be called in sequence
without interrupting the sequence by another command.
AV2 mode
In AV2 mode, this command is only available to get random numbers. In this case, there are no
special constraints on the expected length for the challenge.
This command is part of an ISO compliant authentication procedure consisting of
SAM_IsoGetChallenge, SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate. It can
be used by a host for authenticating the MIFARE SAM AV2.
Note that this command is only available in AV1 compatibility mode.
Such an authentication proves that both the MIFARE SAM AV2 and the host contain the same
secret, namely a DES, TDEA or AES key, and generates a session key for further cryptographic
operations.
This command is part of an ISO compliant authentication procedure consisting of
SAM_IsoGetChallenge, SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate. It can
be used by a host for authenticating the MIFARE SAM AV2.
Note that this command is only available in AV1 compatibility mode.
Such an authentication proves that both the MIFARE SAM AV2 and the host contain the same
secret, namely a DES, TDEA or AES key, and generates a session key for further cryptographic
operations.
The SAM_GetVersion command returns manufacturing related data of the MIFARE SAM AV2.
The SAM_GetVersion command can be used to detect whether a SAM has been switched to the
MIFARE SAM AV2 mode.
Will force the MIFARE SAM AV2 to put a connected RC222 into sleep mode and itself into idle
mode to reduce power consumption.
The MIFARE SAM AV2 will answer the command and afterwards switch to idle mode.
The MIFARE SAM AV2 will automatically return to normal operation after receiving the first
character of the next command. The RC222 will stay in sleep mode until a command is issued
which utilizes the reader IC. Then the MIFARE SAM AV2 automatically carries out the wake-up
sequence before starting the requested operation.
All information provided in this document is subject to legal disclaimers.
Rev. 1 — 12 August 2010
191710
…continued
P5DF081
MIFARE SAM AV2
© NXP B.V. 2010. All rights reserved.
14 of 36

Related parts for P5DF081HN/T1AD2060