APPLICATION NOTE Factory Default Test Data ATECC108A and ATECC508A Description The Atmel® CryptoAuthentication™ ATECC108A and ATECC508A crypto element devices with hardware-based key storage come with a preset factory configuration for the Configuration zone and the Data/OTP zones. The factory configuration is intended to be used for constant/fixed vector testing; however, it can also be used as a guide for the designer to configure their own system as many common use cases are covered. It is not recommended that factory values be left in the data key slots. The customer should always create unique 32-byte values for these slots prior to system shipment. This application note provides the factory configuration values for the Configuration and Data/OTP zones. The details of the factory Configuration zone, OTP zones, and the key values are discussed. The Atmel Crypto Evaluation Studio (ACES) software is used to configure the crypto element device. The Configuration zone, slots, and Data/OTP zones are viewable with ACES. ACES can be downloaded from www.atmel.com. Figure 1. ACES – Software Environment for Demo, Evaluation, and Design Device Navigator Generates, Stores, and Reloads Configuration Files. Tools Demos and Wizards Commands Help Datasheet Explained via Help Screens Configuration Zone Displays EEPROM Registers and Contents. Communication Log ● Teaches Command, Structure, and Encoding. ● Displays Actions and Results. Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015 1 Configuration Zone The Configuration zone consists of fixed data (serial number and revision number), device configuration (I2C address, Selector mode, etc.), and slot configuration information. This zone must be written and locked prior to writing to the Data/OTP zones. 1.1 Fixed Data and Device Configuration Table 1-1. 2 Configuration Zone Byte Name Default Value 0x00 SN03[4]; (MfrID = 01 23 EE for SA102) 0x01, 0x23, 0x02, 0x03 0x00 RevNum[4]; , , , 0x00 SN48[5]; (SN = 02 03 04 05 06 07 for SA102) 0x04, 0x05, 0x06, 0x07, 0xEE 0x00 EE config 0xA1 0x00 I2C Enable 0x18 0x00 TestConfig: EnLock 0x55 0x00 TWIaddress 0xC8 0x00 tempOffset; 0x00 0x00 OTPMode 0x55 0x00 Chip Mode 0x00 0x00 slotConfig[0-3] from other worksheet , , , , slotConfig[4-7] , , , , slotConfig[8-11] , , , , slotConfig[12-15] , , , 0x00 useFlag / useCount for keys 0-3 {0xFF, 0}, {0xFF, 0}, {0xFF, 0}, {0xFF, 0} 0x00 useFlag / useCount for keys 4-7 {0xFF, 0}, {0xFF, 0}, {0xFF, 0}, {0xFF, 0} 0x00 lastKeyUse[0-7]; 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff lastKeyUse[8-15]; 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff 0x00 userExtra 0x00 0x55 Selector/family code 0x00 0x00 lockValue (unlocked) 0x55 0x00 lockConfig (unlocked) 0x55 0x58 Slot Locked 0xFF, 0xFF 0x00 tempSenseConfig 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF 0x60 Key Config[0-3] 0x0000, 0x0000, 0x0000, 0x0000 0x68 Key Config[4-7] 0x0000, 0x0000, 0x0000, 0x0000 0x70 Key Config[8-11] 0x0000, 0x0000, 0x0000, 0x0000 0x78 Key Config[12-15] 0x0000, 0x0000, 0x0000, 0x0000 0x80 STI_LOCK 0xFF 0x81 ChargePumpSlope 0x00 0x82 EE Checksum 0x00 ATECC108A/508A Factory Default Test Data [APPLICATION NOTE] 2 Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015 Name Default Value 0x00 DEK 0x00, 0x00, 0x00 0x87 TestConfig 0x00 0x88 RandIV 1 0x89 Spare 2 0x8A KeyIV 1, 2, 3, 4, 5, 6 0x00 RandA_Seed 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 0x00 RandB_Seed 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 0xB0 SlotIV 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 Slot Configuration Each of the 16 slots in the device must be configured via the SlotConfig field to control access and usage. The below table lists the default values for these fields. WriteKey IsSecret EncryptRd SingleUse CheckOnly Slot Configuration ReadKey Table 1-2. Key 1.2 Byte WriteConfig Notes Straightforward usage – fixed key. 0 15 0 0 0 1 0 Never 1 0 0 0 0 1 1 RollAuth 2 2 0 0 0 1 0 RollParent 3 3 0 1 0 1 0 RollFree No-auth Roll Key 4 4 1 0 0 1 0 Encrypt Key for host use only. 5 0 0 1 0 1 5 Never 6 6 0 0 0 1 0 Encrypt Normal parent updateable key. 7 7 0 0 0 1 7 Always Easily updated key. 8 15 0 0 0 0 0 Always Straightforward usage – R/W data. 9 9 0 0 0 1 2 ChildAuth Child key (Parent is 2). 10 10 0 0 0 1 10 ChildFree Child – no authorization required. 11 11 0 0 0 0 11 Never 12 12 0 0 0 0 12 Encrypt Protected write, open read data – self encrypt. 13 13 1 0 1 1 13 Encrypt Host data to be validated. 14 2 0 0 1 1 2 Encrypt R/W Encrypted data slot. 15 15 0 1 0 1 15 Never Rollable Key – MAC required; no parent update. Rollable Key – MAC required; parent update. Single use key slot. Read only data. Limited use key. ATECC108A/508A Factory Default Test Data [APPLICATION NOTE] Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote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able 2-1. 33 89 AA 00 23 B6 CC 53 B7 B9 E9 BB 51 FD 2F 74 CD 0E 91 D9 7F EB 84 7B 98 09 F4 CD 93 6A B6 48 6 22 23 55 21 55 19 20 5 18 44 16 17 44 15 4 13 14 33 12 33 10 11 3 9 22 C1 7C 1C 4D 56 8 22 7 2 6 1 5 11 4 00 A1 AC 57 FF 40 4E 45 D4 04 01 BD 0E D3 C6 73 D3 B7 B8 2D 85 D9 F3 3 11 2 00 1 0 Key 0 2 Data/OTP Zones The ECC devices also come with preconfigured Data and OTP zones. Each byte on the OTP zone is configured to 0xFF, while each byte on the Data zone is configured with a default specific value. The default value of the Data zone can be found in the below table. Before writing to the OTP/Data slots, the Configuration zone must be configured and locked. Data Zones ATECC108A/508A Factory Default Test Data [APPLICATION NOTE] 4 Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015 3 Revision History Doc Rev. Date 8953A 07/2015 Comments Initial document release. ATECC108A/508A Factory Default Test Data [APPLICATION NOTE] Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015 5 5 Atmel Corporation 1600 Technology Drive, San Jose, CA 95110 USA T: (+1)(408) 441.0311 F: (+1)(408) 436.4200 │ www.atmel.com © 2015 Atmel Corporation. / Rev.:Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015. Atmel®, Atmel logo and combinations thereof, Enabling Unlimited Possibilities®, CryptoAuthentication™, and others are registered trademarks or trademarks of Atmel Corporation in U.S. and other countries. Other terms and product names may be trademarks of others. DISCLAIMER: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any i ntellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN THE ATMEL TERMS AND CONDITIONS OF SALES LOCATED ON THE ATMEL WEBSITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODU CTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILIT Y, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAG ES FOR LOSS AND PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and products descriptions at any time without notice. Atmel does not make any com mitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life. 6 SAFETY-CRITICAL, MILITARY, AND AUTOMOTIVE APPLICATIONS DISCLAIMER: Atmel products are not designed for and will not be used in connection with any applications where the failure of such products would reasonably be expected to result in significant personal injury or death (“Safety -Critical Applications”) without an Atmel officer's specific written consent. Safety-Critical Applications include, without limitation, life support devices and systems, equipment or systems for the operation o f nuclear facilities and weapons systems. Atmel products are not designed nor intended for use in military or aerospace applications or environments unless specifically designated by Atme l as military-grade. Atmel products are not designed nor intended for use in automotive applications unless specifically designated by Atmel as automotive-grade. Atmel-8953A-CryptoAuth-ECC-Factory-Default-Test-Data-ApplicationNote_072015 ATECC108A/508A Factory Default Test Data [APPLICATION NOTE] 6