Atmel ATAES132
32K AES Serial EEPROM Specification
Preliminary Datasheet
Features
•
•
32Kbits of standard Serial EEPROM user memory
•
Compatible with the Atmel AT24C32D and the Atmel AT2530B
•
16 user zones of 2Kbits each
High security features
•
•
•
•
•
•
•
AES algorithm with 128-bit keys
AES-CCM for authentication
Message authentication code for cryptographic operations
Secure storage for sixteen 128 bit keys
Encrypted user memory read and write
FIPS random number generator
16 non-reversible monotonic counters
•
•
•
•
•
•
Flexible user configured security
•
User zone access rights are independently configured
•
Authentication prior to zone access
Read/write, Encrypted, or Read only user zone options
High speed serial interface options
•
10MHz SPI (Mode 0 and 3)
•
1MHz I
2
C
2.5V to 5.5V supply, <250nA Sleep
Packages: SOIC, TSSOP or UDFN
•
Serial EEPROM compatible pinout
Operating temperature
•
-40° to +85°C
Description
The Atmel
®
ATAES132 is a high security Serial electrically-erasable and programmable
read only memory (EEPROM) providing both authentication and confidential nonvolatile
data storage capabilities. Access restrictions for the sixteen user zones are independently
configured, which any key can be used with any zone. Keys can also be used for stand-
alone authentication. This flexibility permits ATAES132 to be used in a wide range of
applications.
The Atmel AES-128 cryptographic engine operates in the AES-CCM mode to provide
authentication, stored data encryption/decryption, and message authentication codes.
Both internally stored data and/or small external data can be protected by the ATAES132
device.
2
The ATAES132 pinout is compatible with the standard SPI and I C Serial EEPROM to
allow placement on existing PC boards. The SPI and I
2
C instruction sets are identical to
the Atmel Serial EEPROM. The extended security functions are accessed by sending
command packets to the ATAES132 using standard write instructions, and reading
8760A−CRYPTO−5/11
responses using standard read instructions. The ATAES132 Secure Serial EEPROM
architecture allows it to be inserted into existing applications.
The ATAES132 chip incorporates multiple physical security mechanisms to prevent
release of the internally stored secrets. Secure personalization features are provided to
facilitate third-party product manufacturing.
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
2
Table of Contents
1. Introduction ....................................................................................................... 5
1.1.
1.2.
1.3.
1.4.
2.1.
2.2.
2.3.
2.4.
3.1.
3.2.
3.3.
3.4.
3.5.
3.6.
4.1.
4.2.
4.3.
4.4.
Scope ............................................................................................................... 5
Conventions .......................................................................................................... 5
Abbreviations ........................................................................................................ 6
Communication ..................................................................................................... 7
2. Memory
........................................................................................................ 9
User Memory ........................................................................................................ 9
Key Memory ......................................................................................................... 9
Configuration Memory .......................................................................................... 9
SRAM Memory ................................................................................................... 10
Architecture ........................................................................................................ 13
Authentication ..................................................................................................... 13
Encrypted Memory Read/Write ........................................................................... 13
Data Encryption/Decryption ................................................................................ 14
Keys
............................................................................................................. 14
Random Numbers............................................................................................... 15
User Zone Configuration ..................................................................................... 16
Key Configuration ............................................................................................... 17
VolatileKey Configuration ................................................................................... 19
Monontonic Counter Configuration ..................................................................... 20
............................................................................................................. 21
............................................................................................................. 22
3. Security Features ............................................................................................ 13
4. Security Configuration Registers .................................................................... 16
5. Standard Serial EEPROM Read and Write Commands ................................. 21
5.2. Read
5.3. Write
6. Atmel ATAES132 Commands ......................................................................... 23
6.1. Command Block and Packet .............................................................................. 23
6.2. Command Summary ........................................................................................... 24
6.3. ReturnCode ........................................................................................................ 26
7. Command Definitions ...................................................................................... 27
7.1. Auth Command ................................................................................................... 27
7.2. AuthCheck Command......................................................................................... 30
7.3. AuthCompute Command .................................................................................... 31
7.4. BlockRead Command ......................................................................................... 32
7.5. Counter Command ............................................................................................. 33
7.6. Crunch Command............................................................................................... 35
7.7. DecRead Command ........................................................................................... 36
7.8. Decrypt Command .............................................................................................. 37
7.9. EncRead Command ........................................................................................... 39
7.10. Encrypt Command .............................................................................................. 41
7.11. EncWrite Command............................................................................................ 42
7.12. Info Command .................................................................................................... 44
7.13. KeyCompute Command ..................................................................................... 46
7.14. KeyExport Command.......................................................................................... 48
7.15. KeyImport Command .......................................................................................... 51
7.16. KeyLoad Command ............................................................................................ 53
7.17. KeyTransfer Command....................................................................................... 54
7.18. Legacy Command............................................................................................... 55
7.19. Lock Command................................................................................................... 56
7.20. Nonce Command ................................................................................................ 58
7.21. NonceCompute Command ................................................................................. 60
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
3
7.22. Random Command............................................................................................. 62
7.23. Reset Command ................................................................................................. 64
7.24. Sleep Command ................................................................................................. 65
7.25. TempSense Command ....................................................................................... 66
7.26. WriteCompute Command ................................................................................... 67
8. Pin Lists 68
8.1. Package Pin List [SOIC, TSSOP, UDFN] ........................................................... 68
9. Electrical Characteristics ................................................................................. 69
9.1.
9.2.
9.3.
9.4.
9.5.
Absolute Maximum Ratings* ............................................................................... 69
Reliability ............................................................................................................ 69
DC Characteristics .............................................................................................. 70
AC Characteristics .............................................................................................. 71
Temperature Sensor Characteristics .................................................................. 75
Appendix A. Standards and Reference Documents .......................................... 76
Appendix B. Memory Map ................................................................................. 77
Appendix C. User Memory Map ........................................................................ 79
Appendix D. Command Memory Map ............................................................... 80
Appendix E. Configuration Memory Map........................................................... 83
Appendix F.
Key Memory Map .......................................................................... 94
Appendix G. Understanding the STATUS Register ........................................... 95
Appendix H. Understanding the Non-Reversible Monotonic Counters ........... 103
Appendix I.
Appendix J.
Cryptographic Computations ...................................................... 105
I
2
C Interface ................................................................................ 122
Appendix K. SPI Interface ............................................................................... 131
Appendix L.
Power Management .................................................................... 138
Appendix M. Block Checksum ......................................................................... 144
Appendix N. Atmel ATAES132 Command Response Time ............................ 146
Appendix O. Default Configuration .................................................................. 149
Appendix P. Serial Memory Backward Compatibility ...................................... 153
Appendix Q. Ordering Information ................................................................... 157
Appendix R. Errata .......................................................................................... 161
Appendix S. Revision History .......................................................................... 165
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
4
1.
Introduction
The Atmel
®
ATAES132 is the first device in a family of high security Serial EEPROM using the advanced encryption standard
(AES) cryptographic algorithm to add authentication capability to a standard Serial EEPROM. The ATAES132 provides
32Kbits of EEPROM user data memory, sixteen 128 bit key registers, sixteen non-reversible monotonic counters, factory
unique die identification numbers, and a configuration memory. The configuration memory registers control access to the
user memory, as well as the restrictions on key and counter functionality.
The user memory can be accessed directly with the standard SPI or I
2
C commands if a user zone is configured for open or
read-only access. If the user zone security is activated, then the extended ATAES132 command set is used to access the
contents of a user zone. The extended ATAES132 commands are executed by writing the command packet to the virtual
memory using standard SPI or I
2
C write commands. The response packet is retrieved by reading it from the virtual memory
2
using standard SPI or I C read commands.
The ATAES132 packages are compatible with the standard SPI and I
2
C EEPROM footprints. This allows the ATAES132 to be
inserted into many existing Serial EEPROM applications.
1.1.
Scope
This
ATAES132 Specification
provides all specifications for its configuration and operation.
1.2.
Conventions
The following nomenclature is used throughout this specification.
•
•
•
•
•
•
•
•
•
•
Host
(The SPI or I
2
C master device)
The host initiates all communications with slave devices on the serial interface bus
Client
(The ATAES132 Secure Serial EEPROM defined by this specification)
Operates as a SPI or I
2
C slave
Nnb
(Binary number)
Denotes a binary number "nn" (Most significant bit on the left)
0xZZZZ
(Hexadecimal number)
Denotes a hex number "ZZZZ" (Most significant bit on the left)
ZZZZ
h
(Hexadecimal number)
Denotes a hex number "ZZZZ" (Most Significant Bit on the left)
RegName.FieldName
(Field name)
Reference to bit field "FieldName" in register "RegName"
RegArray[xx].FieldName
(Field name)
Reference to bit field "FieldName" in register "RegArray[xx]" where "xx" is the array index
UZ
(User zone)
Reference to a user zone number
CntID
(Counter ID)
Reference to a counter number
KeyID
(Key ID)
References to a key register number
Atmel ATAES132 Preliminary Datasheet
8760A−CRYPTO−5/11
5