Hi!
I used tis example https://github.com/sathibault/cr...
How i can get plain (clean) data from response:
after atcab_mac(0x00, 0x1, challenge, response);
Thx, Aleksandr!
Hi!
I used tis example https://github.com/sathibault/cr...
How i can get plain (clean) data from response:
after atcab_mac(0x00, 0x1, challenge, response);
Thx, Aleksandr!
How i can get plain (clean) data from response:
Hi - welcome to the forum. What do you mean by "plain clean data"? The MAC is a sha-256 digest of the define input.
Hi! Thanks!
I want to record data in production, and count them already at work. But so that no one could decipher what it is! And the second one. I want to know that this is exactly my chip, and not slipped by an attacker.
I want to record data in production
I don't think you want the ATSHA204a for storing data. It really is designed for hardware authentication. The ATAES132a is designed for storing secrets, but its not really designed to store large amounts of data, mostly designed for key storage or key management.
I want to know that this is exactly my chip, and not slipped by an attacker.
This is what the ATSHA204a is designed for. But you haven't really asked a valid question.
Hi! Sorry for waiting!
I would like to use "Standart Encrypted Reads and Writes" from doc "Atmel-8981B-CryptoAuth-Encrypted-Reads-Writes-ApplicationNote_102015" and github.com/MicrochipTech/cryptoauthlib
But I stopped at a step Write : GenDig on host.
Unfortunately I did not find an example.