APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.



Similar documents
APPLICATION NOTE. Authentication Counting. Atmel CryptoAuthentication. Features. Introduction

Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction

CryptoAuth Xplained Pro

AT88CK490 Evaluation Kit

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features

SMARTCARD XPRO. Preface. SMART ARM-based Microcontrollers USER GUIDE

APPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features

AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE

More Secure, Less Costly IoT Edge Node Security Provisioning

AT11805: Capacitive Touch Long Slider Design with PTC. Introduction. Features. Touch Solutions APPLICATION NOTE

AVR106: C Functions for Reading and Writing to Flash Memory. Introduction. Features. AVR 8-bit Microcontrollers APPLICATION NOTE

AVR32701: AVR32AP7 USB Performance. 32-bit Microcontrollers. Application Note. Features. 1 Introduction

Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features.

AT88CK490 and AT88CK590

Using CryptoMemory in Full I 2 C Compliant Mode. Using CryptoMemory in Full I 2 C Compliant Mode AT88SC0104CA AT88SC0204CA AT88SC0404CA AT88SC0808CA

APPLICATION NOTE. AT12405: Low Power Sensor Design with PTC. Atmel MCU Integrated Touch. Introduction

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

APPLICATION NOTE. Atmel AVR134: Real Time Clock (RTC) Using the Asynchronous Timer. Atmel AVR 8-bit Microcontroller. Introduction.

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or

Dell Statistica. Statistica Document Management System (SDMS) Requirements

APPLICATION NOTE. AT17284: Proximetry Cloud Based Smart Plug User Guide. SMART ARM-based Microcontrollers. Introduction. Features

APPLICATION NOTE. RF System Architecture Considerations ATAN0014. Description

Dell Spotlight on Active Directory Server Health Wizard Configuration Guide

Spotlight Management Pack for SCOM

8-bit. Application Note. Microcontrollers. AVR282: USB Firmware Upgrade for AT90USB

USER GUIDE. ZigBit USB Stick User Guide. Introduction

AVR32138: How to optimize the ADC usage on AT32UC3A0/1, AT32UC3A3 and AT32UC3B0/1 series. 32-bit Microcontrollers. Application Note.

USER GUIDE EDBG. Description

Dell InTrust Preparing for Auditing Cisco PIX Firewall

32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2

formerly Help Desk Authority Quest Free Network Tools User Manual

Using the RS232 serial evaluation boards on a USB port

AVR1922: Xplain Board Controller Firmware. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

APPLICATION NOTE. Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver. Atmel SAMD20. Description. Features

Atmel AVR4903: ASF - USB Device HID Mouse Application. Atmel Microcontrollers. Application Note. Features. 1 Introduction

AVR1309: Using the XMEGA SPI. 8-bit Microcontrollers. Application Note. Features. 1 Introduction SCK MOSI MISO SS

Quest vworkspace Virtual Desktop Extensions for Linux

AVR1900: Getting started with ATxmega128A1 on STK bit Microcontrollers. Application Note. 1 Introduction

QT1 Xplained Pro. Preface. Atmel QTouch USER GUIDE

Introduction to Version Control in

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

APPLICATION NOTE. Atmel LF-RFID Kits Overview. Atmel LF-RFID Kit. LF-RFID Kit Introduction

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

AVR131: Using the AVR s High-speed PWM. Introduction. Features. AVR 8-bit Microcontrollers APPLICATION NOTE

AVR127: Understanding ADC Parameters. Introduction. Features. Atmel 8-bit and 32-bit Microcontrollers APPLICATION NOTE

Designing Feature-Rich User Interfaces for Home and Industrial Controllers

Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures. Atmel Microcontrollers. Application Note. Features.

Dell Statistica Statistica Enterprise Installation Instructions

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Security Analytics Engine 1.0. Help Desk User Guide

Dell Statistica Document Management System (SDMS) Installation Instructions

Application Note. 8-bit Microcontrollers. AVR270: USB Mouse Demonstration

APPLICATION NOTE. Atmel AT02985: User s Guide for USB-CAN Demo on SAM4E-EK. Atmel AVR 32-bit Microcontroller. Features. Description.

New Features and Enhancements

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Top 10 Most Popular Reports in Enterprise Reporter

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

AVR317: Using the Master SPI Mode of the USART module. 8-bit Microcontrollers. Application Note. Features. Introduction

How To Design An Ism Band Antenna For 915Mhz/2.4Ghz Ism Bands On A Pbbb (Bcm) Board

AN AES encryption and decryption software on LPC microcontrollers. Document information

AVR115: Data Logging with Atmel File System on ATmega32U4. Microcontrollers. Application Note. 1 Introduction. Atmel

Dell InTrust Preparing for Auditing CheckPoint Firewall

Capacitive Touch Technology Opens the Door to a New Generation of Automotive User Interfaces

General Porting Considerations. Memory EEPROM XRAM

Wireless Subwoofer TI Design Tests

Dell InTrust Preparing for Auditing Microsoft SQL Server

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

AVR287: USB Host HID and Mass Storage Demonstration. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

Dell One Identity Cloud Access Manager SonicWALL Integration Overview

Dell One Identity Cloud Access Manager How to Configure for High Availability

Spotlight Management Pack for SCOM

AVR1510: Xplain training - XMEGA USART. 8-bit Microcontrollers. Application Note. Prerequisites. 1 Introduction

AVR1600: Using the XMEGA Quadrature Decoder. 8-bit Microcontrollers. Application Note. Features. 1 Introduction. Sensors

Defender Delegated Administration. User Guide

AVR319: Using the USI module for SPI communication. 8-bit Microcontrollers. Application Note. Features. Introduction

formerly Help Desk Authority HDAccess Administrator Guide

TERMS AND CONDITIONS

Dell One Identity Cloud Access Manager Installation Guide

AVR033: Getting Started with the CodeVisionAVR C Compiler. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR353: Voltage Reference Calibration and Voltage ADC Usage. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

E-Sign Disclosure & E-Statements Terms and Conditions

APPLICATION NOTE. AT05558: Wireless Manufacturing Test Kit. Atmel ATmega256RFR2. Description. Features

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

AT91SAM ARM-based Flash MCU. Application Note

How to Deploy Models using Statistica SVB Nodes

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

AT15007: Differences between ATmega328/P and ATmega328PB. Introduction. Features. Atmel AVR 8-bit Microcontrollers APPLICATION NOTE

Object Level Authentication

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

MDM Zinc 3.0 End User License Agreement (EULA)

Covered California. Terms and Conditions of Use

BlackBerry Business Cloud Services. Version: Release Notes

AVR2006: Design and characterization of the Radio Controller Board's 2.4GHz PCB Antenna. Application Note. Features.

SAMA5D2. Scope. Reference Documents. Atmel SMART ARM-based MPU ERRATA

Transcription:

APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto device) are state of the art Security IC hardware that has been developed for secure key storage. Often times, the end product that these devices are being used in are assembled and configured at third party test houses. For security reasons, one may not want to give the third party test houses secrets in the clear. The devices have the ability to securely transport these secrets to the subcontractor encrypted. Then internally to the device, it will decrypt the data and then program the information into the proper slots without being exposed to the outside. Overview The transport key allows for secure programming of the crypto devices without the third party programming company having access to the value of the Data zone. The programming company will be able to program and verify the content of these devices without having knowledge of the content. The crypto devices have three different zones that can be programmed: Configuration Zone OTP Zone Data Zone There are also two lock bits: One for the Configuration Zone One for both the Data and OTP Zones The Configuration zone is always readable in the clear and once locked, is read-only. The Data and OTP zones are not writeable until after the Configuration zone is locked.

1 Acquiring a Transport Key To obtain a transport key, contact Atmel at cryptosecrets@atmel.com. As part of the request, it is required to provide: A Public Encryption Key to ensure that you and only you know the value of the transport key. In response, the following is sent from Atmel: Encrypted Transport Key Transport Keys ID the crypto device is used to select the correct internal Transport Key when programming. 2 Zones 2.1 Configuration Zone The Configuration zone is always readable in the clear; therefore, there is no reason for using a transport key to program the crypto device s Configuration zone. The Configuration zone should be locked using a validation CRC in the Lock command. The content of the locked Configuration zone should be mixed into the encryption key, along with the transport key when programming the Data zone. This ensures the device was configured as expected in order to program the correct Data zone values. 2.2 Data Zone The Data zone is the secure area of the device. Use of a transport key is recommended to ensure no one has gotten access to the internal data of that device. The transport key is used as the initial secret that only the customer and the device know when issuing an encrypted write command to the Data zone. The key steps in securing the secrets are to: 1. Generate a random number and mix in the configuration making the configuration part of the SHA calculation. 2. SHA in the current value of the slot that will be used for the session key. 3. SHA in the unique transport key. As an option, mix in other non-secret OTP data to ensure proper programming of the OTP zone. The value should then be written back to the session slot. 4. Using the newly created session key, issue encrypted writes to each Data zone slot with the session key slot being the last slot programmed. Once the device is programmed the Data and OTP zones should be locked. 2.3 OTP Zone The OTP zone is always readable in the clear and therefore cannot contain secure information. In order to guarantee the value of the OTP zone: 1. Program the OTP zone. 2. Lock the OTP zone prior to encrypting the write to the Data zone. 3. The OTP zone content should then be mixed into the encryption key used for the Data zone. 2 Secure 2 Authentication With Transport Key Authentication [APPLICATION NOTE]

2.4 Configuration Use of a transport key only requires the Configuration zone to be locked prior to programming the Data zone. Until the Data zone is locked, the slot configuration information is not used, and no reads from the Data zone are allowed. Once the Configuration zone is locked, the Data zone becomes writable, and the encrypted data can be loaded into the crypto device with an internal transport key used for decryption. 3 Programming Flow To setup the Session Key for programming the Data zone, the following commands are used: Table 3-1. Program and Lock the Configuration Zone Commands Command Nonce (Seed) (Config Zone 1) (OTP Zone 0) (OTP Zone 1) (Transport Key) Write Description Load TempKey with the random number used during encryption. Mix in the valid Configuration zone. This is recommended to ensure proper configuration of the slot security settings. Verify the OTP zone is programmed correctly. (Optional) Verify the OTP zone is programmed correctly. (Optional) Add the transport key into the session key. Mix in the current value of the data slot. Store the session key to a slot. Table 3-2. Write Commands Commands Nonce (Seed) Write (Data Zone Slot N) Description Mix in the Session Key Store the encrypted data into a slot The slot used for the session key should be the last slot to be programming when writing the encrypted data to the device. Secure Authentication With Transport Key Authentication [APPLICATION NOTE] 3 3

4 Revision History Doc Rev. Date Comments 8860A 11/2015 Initial document release. 4 Secure 4 Authentication With Transport Key Authentication [APPLICATION NOTE]

Atmel Corporation 1600 Technology Drive, San Jose, CA 95110 USA T: (+1)(408) 441.0311 F: (+1)(408) 436.4200 www.atmel.com 2015 Atmel Corporation. / Rev.:. Atmel, Atmel logo and combinations thereof, Enabling Unlimited Possibilities, CryptoAuthentication, and others are registered trademarks or trademarks of Atmel Corporation in U.S. and other countries. Other terms and product names may be trademarks of others. DISCLAIMER: The information in this document is provided in connection with Atmel products. No license, express or implied, b y estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN THE ATMEL TERMS AND CONDITIONS OF SALES LOCATED ON THE ATMEL WEBSITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO I TS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON -INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (I NCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS AND PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATM EL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and products descriptions at any time without notice. Atmel does not make any com mitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atme l products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life. SAFETY-CRITICAL, MILITARY, AND AUTOMOTIVE APPLICATIONS DISCLAIMER: Atmel products are not designed for and will not be used in conne ction with any applications where the failure of such products would reasonably be expected to result in significant personal injury or death ( Safety-Critical Applications ) without an Atmel officer's specific written consent. Safety-Critical Applications include, without limitation, life support devices and systems, equipment or systems for the operation of nuclear facilities and weapons systems. Atmel products are not designed nor intended for use in military Secure or aerospace Authentication applications or environments With Transport unless specifically Key designated Authentication by Atmel as military-grade. [APPLICATION Atmel products NOTE] are not designed nor 5 intended for use in automotive applications unless specifically designated by Atmel 5 as automotive -grade.