ATAES132-TH-EQ Atmel, ATAES132-TH-EQ Datasheet - Page 90

no-image

ATAES132-TH-EQ

Manufacturer Part Number
ATAES132-TH-EQ
Description
EEPROM AES 32Kbit EE SPI
Manufacturer
Atmel
Datasheet

Specifications of ATAES132-TH-EQ

Rohs
yes
Maximum Clock Frequency
10 MHz
Operating Supply Voltage
6 V
Maximum Operating Temperature
- 40 C to + 85 C
Mounting Style
SMD/SMT
Package / Case
TSSOP-8
Interface Type
SPI
Factory Pack Quantity
2300
A key can be disabled by setting KeyConfig[KeyN].AuthKey to 1b and KeyConfig[KeyN].LinkPointer to contain "KeyN", where
the KeyN = KeyID of the key being configured.
Table E-18. Definition of the KeyConfig register bits
CounterConfig Field
ExternalCrypto
InboundAuth
RandomNonce
LegacyOK
AuthKey
Child
Parent
ChangeKeys
CounterLimit
ChildMac
AuthOut
AuthOutHold
ImportOK
ExportAuth
Byte
0
0
0
0
0
0
0
0
1
1
1
1
1
1
Bit
0
1
2
3
4
5
6
7
0
1
2
3
4
5
Description
If 1b, then the key can be used with the encrypt and decrypt commands
If 0b, then the encrypt and decrypt commands are prohibited
If 1b, then the key can only be used by the Auth command for inbound only or
If 0b, then key can be used for any purpose not prohibited by another KeyConfig
If 1b, then operations using this key require a Random Nonce. (see Section
If 0b, then the nonce is not required to be random
If 1b, then this key can be used with the legacy command
If 0b, then the key cannot be used with the legacy command
If 1b, then this key requires prior authentication using the KeyID stored in
If 0b, then prior authentication is not required
If 1b, then key is permitted to be the target of a KeyCompute and/or KeyLoad
If 0b, then this use is prohibited
If 1b, then key may be used as the VolatileKey parent by the KeyCompute or
If 0b, then this use is prohibited
If 1b, then key updates are permitted after locking. The new key is written using
If 0b, then key updates with EncWrite command are prohibited
If 1b, usage count limits are enabled for this key (see CounterNum)
If 0b, then there are no usage limits
If 1b, then an input MAC is required to modify this key using the KeyCompute
If 0b, the KeyCompute command does not require an input MAC (it will be
If 1b, then I
If 0b, then I
If 1b, the I
If 0b, then the I
If 1b, then this key is permitted to be the target of a KeyImport command.
If 0b, then the KeyImport command is prohibited
If 1b, then the KeyExport and KeyCompute commands require prior
If 0b, then prior authentication is not required
mutual authentication. Key can not be used by any other command, but
KeyID can be the target of a key management command.
bit, including Outbound Only authentication
7.20)
LinkPointer
command
KeyLoad commands. This key may also be used as the decrypt key by the
KeyImport command when the target key is the VolatileKey. (see Section
4.3)
the EncWrite command with a MAC generated with the current value of
key. (see Section 7.11)
command
ignored if provided)
executed using this key
executed using this key (see Section J.5)
authentication using the KeyID stored in LinkPointer
(1)(3)
2
C AuthO output state is unchanged when an Authentication Reset is
2
2
C Auth signaling is enabled for this key (see Section J.5)
C Auth signaling is disabled for this key
2
C AuthO output is reset when an Authentication Reset is
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
(2)
90

Related parts for ATAES132-TH-EQ