Table Of Contents - Libelium Waspmote v15 and Plug & Sense Programming Manual

Waspmote encryption libraries
Table of Contents

Advertisement

Document version: v7.0 - 02/2017
© Libelium Comunicaciones Distribuidas S.L.
INDEX
1. Introduction ......................................................................................................................................... 3
2. Integrity ................................................................................................................................................ 6
2.1. Waspmote Libraries ....................................................................................................................................................................6
2.1.1. Waspmote Hash Files .................................................................................................................................................6
2.1.2. Constructor ....................................................................................................................................................................6
2.1.3. Pre-Defined Constants ...............................................................................................................................................6
2.2. Calculating Message Digest .....................................................................................................................................................7
2.2.1. Calculating MD5 hash .................................................................................................................................................7
2.2.2. Calculating SHA hash .................................................................................................................................................7
2.3. Printing Message ..........................................................................................................................................................................8
3. Authenticity ......................................................................................................................................... 9
3.1. Waspmote Libraries ................................................................................................................................................................. 10
3.1.1. Waspmote RSA Files .................................................................................................................................................10
3.1.2. Constructor ..................................................................................................................................................................10
3.1.3. Pre-Defined Constants .............................................................................................................................................10
3.2. Encrypting Message ................................................................................................................................................................. 10
4. Confidentiality (privacy) ................................................................................................................... 11
4.1. Waspmote Libraries ................................................................................................................................................................. 13
4.1.1. Waspmote AES Files .................................................................................................................................................13
4.1.2. Constructor ..................................................................................................................................................................13
4.1.3. Pre-Defined Constants .............................................................................................................................................13
4.2. Calculating the encrypted message length ................................................................................................................... 13
4.3. AES Encryption ......................................................................................................................................................................... 13
4.4. Printing Message ....................................................................................................................................................................... 14
5. Secure Communication Scheme ....................................................................................................... 15
6. Key Management on Meshlium ........................................................................................................ 16
6.1. Link layer key Management (only XBee) .......................................................................................................................... 16
6.2. Application Layer Key Management (AES libraries) ..................................................................................................... 18
7. Code examples and extended information .................................................................................... 20
8. API changelog .................................................................................................................................... 22
9. Certifications ...................................................................................................................................... 23
-2-
Index
v7.0

Advertisement

Table of Contents
loading

Table of Contents