ATSHA204a Get Plain (clean) data

Go To Last Post
4 posts / 0 new
Author
Message
#1
  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 0

Hi!

 

I used tis example https://github.com/sathibault/cr...

How i can get plain (clean) data from response:

after atcab_mac(0x00, 0x1, challenge, response);

 

Thx, Aleksandr!

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 0

bullitmaster wrote:
How i can get plain (clean) data from response:

 

Hi - welcome to the forum. What do you mean by "plain clean data"? The MAC is a sha-256 digest of the define input. 

"When all else fails, read the directions"

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 0

Hi! Thanks!

I want to record data in production, and count them already at work. But so that no one could decipher what it is! And the second one. I want to know that this is exactly my chip, and not slipped by an attacker.

  • 1
  • 2
  • 3
  • 4
  • 5
Total votes: 0

bullitmaster wrote:
I want to record data in production

 

I don't think you want the ATSHA204a for storing data. It really is designed for hardware authentication. The ATAES132a is designed for storing secrets, but its not really designed to store large amounts of data, mostly designed for key storage or key management. 

 

bullitmaster wrote:
I want to know that this is exactly my chip, and not slipped by an attacker.

 

This is what the ATSHA204a is designed for. But you haven't really asked a valid question. 

"When all else fails, read the directions"