Cryptoderivekey; Table 10-4: Cryptoderivekey Command; Table 10-5: Cryptoderivekey Response - Semtech LR1121 User Manual

Table of Contents

Advertisement

10.3.3 CryptoDeriveKey

Command CryptoDeriveKey(...) derives (encrypts) into a specific Key identified by DstKeyID, the input (including the
LoRaWAN DevNonce) value provided, using a source key identified by SrcKeyID.

Table 10-4: CryptoDeriveKey Command

Byte
0
Data from Host
0x05
Data to Host
Stat1

Table 10-5: CryptoDeriveKey Response

Byte
Data from Host
Data to Host
DstKeyID and SrcKeyID for this function are defined in
DstKeyID: Destination Key ID. Valid values are from 4 to 25.
SrcKeyID: Source Key IDs 2-3 and 6-11 are possible for this function.
Input[1:16] is an array of bytes. An example of its construction is given in
CEStatus is defined in section
Note: At the end of the CryptoDeriveKey() process, the generated key is located in the dedicated Crypto Engine RAM, and
can be stored in the flash memory using the CryptoStoreToFlash() command.
LR1121
User Manual
Rev 1.1
UM.LR1121.W.APP
Mar 2023
1
2
3
SrcKeyID
DstKeyID
0x03
(7:0)
(7:0)
IrqStatus
IrqStatus
Stat2
(31:24)
(23:16)
0
0x00
Stat1
CEStatus on page
103.
www.semtech.com
4
5
IrqStatus
IrqStatus
(15:8)
(7:0)
1
0x00
CEStatus
Table 10-1: Cryptographic Keys Usage and
Section 11.3
6
...
Input[1:16]
0x00
...
Derivation.
and
Section
11.4.
Proprietary & Confidential
19
0x00
104 of 130
Semtech

Advertisement

Table of Contents
loading

Table of Contents