
Atmel ATAES132 Preliminary Datasheet 3
8760A−CRYPTO−5/11
Table of Contents
1. Introduction ....................................................................................................... 5
1.1. Scope ............................................................................................................... 5
1.2. Conventions .......................................................................................................... 5
1.3. Abbreviations ........................................................................................................ 6
1.4. Communication ..................................................................................................... 7
2. Memory ........................................................................................................ 9
2.1. User Memory ........................................................................................................ 9
2.2. Key Memory ......................................................................................................... 9
2.3. Configurat i on Mem or y .......................................................................................... 9
2.4. SRAM Memory ................................................................................................... 10
3. Security Features ............................................................................................ 13
3.1. Architecture ........................................................................................................ 13
3.2. Authentication ..................................................................................................... 13
3.3. Encrypted Memory Read/W r i te ........................................................................... 13
3.4. Data Encryption/Decrypt ion ................................................................................ 14
3.5. Keys ............................................................................................................. 14
3.6. Random Numbers ............................................................................................... 15
4. Security Configuration Regi st ers .................................................................... 16
4.1. User Zone Configuration ..................................................................................... 16
4.2. Key Configuration ............................................................................................... 17
4.3. Volatil eK ey Configurat ion ................................................................................... 19
4.4. Monontonic Counter Configuration ..................................................................... 20
5. Standard Seri al E EPROM Read and Write Commands ................................. 21
5.2. Read ............................................................................................................. 21
5.3. Write ............................................................................................................. 22
6. Atmel ATAES132 C om m ands ......................................................................... 23
6.1. Command Bl ock and Packet .............................................................................. 23
6.2. Command Summary ........................................................................................... 24
6.3. ReturnCode ........................................................................................................ 26
7. Command Defini tions ...................................................................................... 27
7.1. Auth Command ................................................................................................... 27
7.2. AuthChec k Command ......................................................................................... 30
7.3. AuthCom pute Com man d .................................................................................... 31
7.4. BlockR ead Command ......................................................................................... 32
7.5. Counter Command ............................................................................................. 33
7.6. Crunch Com mand ............................................................................................... 35
7.7. DecRead Command ........................................................................................... 36
7.8. Decrypt Com mand .............................................................................................. 37
7.9. EncRead Command ........................................................................................... 39
7.10. Encrypt Command .............................................................................................. 41
7.11. EncWrite Command ............................................................................................ 42
7.12. Info Command .................................................................................................... 44
7.13. KeyCompute Com m and ..................................................................................... 46
7.14. KeyExpor t Command .......................................................................................... 48
7.15. KeyImport Com mand .......................................................................................... 51
7.16. KeyLoad Command ............................................................................................ 53
7.17. KeyTransfer Command ....................................................................................... 54
7.18. Legacy Command ............................................................................................... 55
7.19. Lock Command................................................................................................... 56
7.20. Nonce Command ................................................................................................ 58
7.21. NonceComput e C om mand ................................................................................. 60