ATAES132-SH-ER Atmel, ATAES132-SH-ER Datasheet - Page 17

no-image

ATAES132-SH-ER

Manufacturer Part Number
ATAES132-SH-ER
Description
EEPROM AES 32Kbit EE I2C
Manufacturer
Atmel
Datasheet

Specifications of ATAES132-SH-ER

Rohs
yes
Maximum Clock Frequency
1 MHz
Operating Supply Voltage
6 V
Maximum Operating Temperature
- 40 C to + 85 C
Mounting Style
SMD/SMT
Package / Case
SOIC-8
Interface Type
I2C
Factory Pack Quantity
2300
4.2.
Key Configuration
Restrictions on key usage are controlled by the KeyConfig registers in the configuration memory. There is one KeyConfig
register for each key.
Table 4-6.
KeyConfig Field
ExternalCrypto
InboundAuth
RandomNonce
LegacyOK
AuthKey
Child
Parent
ChangeKeys
CounterLimit
ChildMac
AuthOut
AuthOutHold
ImportOK
ExportAuth
Definition of the KeyConfig register bits
Byte
0
0
0
0
0
0
0
0
1
1
1
1
1
1
Bit
0
1
2
3
4
5
6
7
0
1
2
3
4
5
Description
If 1b, then the key can be used with the encrypt and decrypt commands
If 0b, then the encrypt and decrypt commands are prohibited
If 1b, then the key can only be used by the Auth command for Inbound Only or
If 0b, then key can be used for any purpose not prohibited by another KeyConfig bit,
If 1b, then operations using this key require a random nonce (see Section 7.20)
If 0b, then the nonce is not required to be random
If 1b, then this key can be used with the legacy command
If 0b, then the key cannot be used with the legacy command
If 1b, then this key requires prior authentication using the KeyID stored in LinkPointer
If 0b, then prior authentication is not required
If 1b, then key is permitted to be the target of a KeyCompute or KeyLoad command
If 0b, then this use is prohibited
If 1b, then key may be used as the VolatileKey parent by the KeyCompute or
If 0b, then this use is prohibited
If 1b, then key updates are permitted after locking. The new key is written using the
If 0b, then key updates with EncWrite command are prohibited
If 1b, usage count limits are enabled for this key (see CounterNum)
If 0b, then there are no usage limits
If 1b, then an input MAC is required to modify this key using the KeyCompute
If 0b, the KeyCompute command does not require an input MAC (it will be ignored if
If 1b, then I
If 0b, then I
If 1b, the I
If 0b, then the I
If 1b, then this key is permitted to be the target of a KeyImport command
If 0b, then the KeyImport command is prohibited
If 1b, then the KeyExport and KeyCompute commands require prior authentication
If 0b, then prior authentication is not required
mutual authentication. The key can not be used by any other command, but
KeyID can be the target of a key management command.
including Outbound Only authentication
KeyLoad commands. This key may also be used as the decrypt key by the
KeyImport command when the target key is the VolatileKey. (see Section 4.3)
EncWrite command with a MAC generated with the current value of key.
(see Section 7.11)
command
provided)
executed using this key
using this key (see Section J.5)
using the KeyID stored in LinkPointer
2
C AuthO output state is unchanged when an authentication reset is
2
2
C Auth signaling is enabled for this key (see Section J.5)
C Auth signaling is disabled for this key
(1)(2)(4)
2
C AuthO output is reset when an authentication reset is executed
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
(3)
17

Related parts for ATAES132-SH-ER