Atmel AT88SC118 [DATASHEET]
Atmel-8857A-CryptoComp-AT88SC118-Datasheet_052013
2
1. Product Overview
The Atmel AT88SC118 is designed as the mate to the CryptoRF (CRF) and CryptoMemory (CM) chips, collectively
referred to in the remainder of this document as CRF. Within the operation descriptions, the AT88SC118
CryptoCompanion chip is sometimes referred to as CMC or CryptoMemory Companion chip.
The AT88SC118 makes extensive use of the SHA-1 hash algorithm as specified in
http://www.itl.nist.gov/fipspubs/fip180-1.htm and elsewhere. In this document, the nomenclature SHA-1(a, b, c) means to
concatenate a, b, and c in that order and then pad them to a block size of 64 bytes before computing the digest. The
AT88SC118 does not ever generate a SHA-1 digest of datasets larger than a single round.
1.1 General Operation
The CRF chip contains secrets that must be known or derived by a Host system in order to establish a trusted link
between the two and permit communications to happen. The AT88SC118 stores these secrets in an obscured way in
nonvolatile memory and contains all the circuitry necessary to perform the authentication, password, and
encryption/decryption functions specified in the CRF datasheet. In this manner, the secrets do not ever need to be
revealed.
The general cryptographic strategy is as follows:
Each CRF chip has a serial or identification number (ID) and authentication secret Gi stored in EEPROM. ID is
freely readable; Gi can never be read and is unique for all tags.
The AT88SC118 contains an EEPROM that contains a set of common secrets (Fn). The
AT88SC118 combines Fn with ID and KID to compute a value of G that is expected to match that in the CRF chip.
Specifically, G = SHA-1(Fn, ID, KID).
G is further diversified by the inclusion of a number (KID) generated by the Host system in a manner of its
choosing. Typically, it will be the result of a cryptographic operation on the CRF ID value calculated using other
data, secrets, and/or algorithms external to the AT88SC118. This permits scenarios that offer varying degrees of
additional security.
The AT88SC118 includes a general purpose cryptographic quality Random Number Generator which is used to
seed a mutual authentication process between the AT88SC118 and CRF. If the CRF confirms the CMC challenge,
and the CMC confirms the CRF response, then the Host system proceeds with CRF operations. In this way, the
Host system may use the CRF without knowing the CRF’s secrets directly.
1.2 CryptoCompanion Benefits
The following is a partial list of the benefits of using this chip versus storing the algorithms and secrets in standard Flash
system memory.
Keep confidential those core secrets that are used to authenticate with and communicate to/from CRF.
(Store them in EEPROM and use them on-chip)
Flexible system implementation — multiple secrets and policies for different CRF locations within the system.
Multiple manufacturer setup options.
Hardware encryption engines, avoids algorithm disclosure from reverse-compilation of system operating code.
Full hardware security implementation makes it harder for an attacker (even with lab equipment) to get secrets
stored on the AT88SC118.
Global secrets are protected using strong security, standard algorithm (SHA-1).
Implements a crunching algorithm to prevent micro-controller based CRF replicas.
Robust Random Number Generation avoids accidental replay for all cryptographic operations using the system;
not just with respect to CRF.
Secure EEPROM storage for configuration information, etc. may permit reduction in the total BOM for the system.
Easy to use — little programming required, no knowledge of security algorithms or protocols, and fast time to
market.