2
Atmel AT88SC118 [Summary Datasheet]
Atmel-8858AS-CryptoComp-AT88SC118-Datasheet-Summary_042013
1. Product Overview
The CryptoCompanion is designed as the mate to the CryptoRF (CRF) and CryptoMemory (CM) devices, collectively
referred to in the remainder of this document as CRF.
The CryptoCompanion makes extensive use of the SHA-1 hash algorithm as specified in
http://www.itl.nist.gov/fipspubs/fip180-1.htm and elsewhere. In this document, the nomenclature SHA-1(a, b, c) means to
concatenate a, b, and c in that order and then pad them to a block size of 64 bytes before computing the digest. The
CryptoCompanion does not ever generate a SHA-1 digest of datasets larger than a single round.
1.1 General Operation
The CRF device contains secrets that must be known or derived by a Host system in order to establish a trusted link
between the two and permit communications to happen. The CryptoCompanion stores these secrets in an obscured way
in nonvolatile memory and contains all the circuitry necessary to perform the authentication, password, and
encryption/decryption functions specified in the CRF datasheet. In this manner, the secrets do not ever need to be
revealed.
The general cryptographic strategy is as follows:
Each CRF device has a serial or identification number (ID) and authentication secret Gi stored in EEPROM. ID is
freely readable; Gi can never be read and is unique for all tags.
The CryptoCompanion contains an EEPROM that contains a set of common secrets (Fn). The
AT88SC118 combines Fn with ID and KID to compute a value of G that is expected to match that in the CRF
device. Specifically, G = SHA-1(Fn, ID, KID).
G is further diversified by the inclusion of a number (KID) generated by the Host system in a manner of its
choosing. Typically, it will be the result of a cryptographic operation on the CRF ID value calculated using other
data, secrets, and/or algorithms external to the AT88SC118. This permits scenarios that offer varying degrees of
additional security.
The CryptoCompanion includes a general purpose cryptographic quality Random Number Generator which is
used to seed a mutual authentication process between the AT88SC118 and CRF. If the CRF confirms the
CryptoCompanion challenge, and the CryptoCompanion confirms the CRF response, then the Host system
proceeds with CRF operations. In this way, the Host system may use the CRF without knowing the CRF’s secrets
directly.
1.2 CryptoCompanion Benefits
The following is a partial list of the benefits of using this device versus storing the algorithms and secrets in standard
Flash system memory.
Keep confidential those core secrets that are used to authenticate with and communicate to/from CRF.
(Store them in EEPROM and use them on-chip)
Flexible system implementation — multiple secrets and policies for different CRF locations within the system.
Multiple manufacturer setup options.
Hardware encryption engines, avoids algorithm disclosure from reverse-compilation of system operating code.
Full hardware security implementation makes it harder for an attacker (even with lab equipment) to get secrets
stored on the CryptoCompanion.
Global secrets are protected using strong security, standard algorithm (SHA-1).
Implements a crunching algorithm to prevent micro-controller based CRF replicas.
Robust Random Number Generation avoids accidental replay for all cryptographic operations using the system;
not just with respect to CRF.
Secure EEPROM storage for configuration information, etc. may permit reduction in the total BOM for the system.
Easy to use — little programming required, no knowledge of security algorithms or protocols, and fast time to
market.