<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTAG 5 Link AUTHENTICATE command only errors 0F in NFC</title>
    <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317452#M14056</link>
    <description>&lt;P&gt;Hi Eduardo,&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt;&amp;nbsp;By any chance, is your Reader adding the proper CRC16 to the Authentication command frame?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Yes I am primarily using an ACR1552U, however I have tested using an HID OmniKey 5022CL as well as an Android 14 application sending the same commands and getting the same 0F error response.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;did you provide a valid AES Key before locking the Key being used? Are you able to authenticate with a different KeyID?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Yes, for ease of testing, key0 is set to all AA bytes, key1 is set to all BB bytes, etc. I first set the operational mode to AES because if you attempt to write keys prior to this, only key0 and part of key1 will retain the data. After writing keys, reading them back, power cycling the chip (removing and placing back on the reader), and reading again, only then did I activate each key. I have tried to send MAM1 and TAM1 via AUTHENTICATE (35h) and specified all keys (00, 01, 02, 03) and all attempts return the same 0F error response. Furthermore, I have tried&amp;nbsp; TAM1 via unaddressed mode CHALLENGE with 250ms delay and READBUFFER and the data returned appears random and does not decrypt to the correct response.&lt;/P&gt;&lt;P&gt;I am at a loss. I have used multiple NTAG 5 link chips embedded in our product, and even chips on test boards -&amp;nbsp;&lt;A href="https://www.mikroe.com/ntag-5-link-click" target="_blank"&gt;NTP5332 NFC Tag Click board™ | NTAG 5 Link Click&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Feb 2026 00:42:38 GMT</pubDate>
    <dc:creator>F938FAFFA317AB</dc:creator>
    <dc:date>2026-02-13T00:42:38Z</dc:date>
    <item>
      <title>NTAG 5 Link AUTHENTICATE command only errors 0F</title>
      <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317028#M14046</link>
      <description>&lt;P&gt;I'm sort of pulling my hair out here. I cannot get the chip to perform a TAM1 or MAM1 cryptographic command. It will only respond with an 0F error. Here is the configuration of my test chip (yes I've tried multiple different chips).&lt;/P&gt;
&lt;P&gt;Device Security Configuration (Block 0x3F)&lt;BR /&gt;- DEV_SEC_CONFIG: 0xA2 — AES mode enabled, writable&lt;/P&gt;
&lt;P&gt;Global Crypto Header (Block 0x0C, Byte 1)&lt;BR /&gt;- NFC_GCH: 0xC1 — Access Right Activated&lt;/P&gt;
&lt;P&gt;Crypto Config Header (Block 0x0D, Byte 1)&lt;BR /&gt;- NFC_CCH: 0xE7 — Active/Locked&lt;/P&gt;
&lt;P&gt;Authentication Limit (Block 0x0E)&lt;BR /&gt;- NFC_AUTH_LIMIT: 0 — Unlimited attempts&lt;/P&gt;
&lt;P&gt;Key Headers (NFC_KHx)&lt;BR /&gt;- KEY0 (0x10): 0xE7 — Active/Locked&lt;BR /&gt;- KEY1 (0x12): 0xE7 — Active/Locked&lt;BR /&gt;- KEY2 (0x14): 0xE7 — Active/Locked&lt;BR /&gt;- KEY3 (0x16): 0xE7 — Active/Locked&lt;/P&gt;
&lt;P&gt;Key Privileges (NFC_KPx)&lt;BR /&gt;- KEY0 (0x11): 0xFF — All privileges (AREA1_Write, AREA1_Read, CryptoConfig, EAS/AFI, Destroy, Privacy, Write, Read)&lt;BR /&gt;- KEY1 (0x13): 0x00 — None&lt;BR /&gt;- KEY2 (0x15): 0x00 — None&lt;BR /&gt;- KEY3 (0x17): 0x00 — None&lt;/P&gt;
&lt;P&gt;Key Storage Blocks&lt;BR /&gt;- All key storage blocks (0x20–0x2F) are protected and unreadable&lt;/P&gt;
&lt;P&gt;Here is the command I'm sending;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The message portion (bytes 12–23) is 12 bytes = 96 bits, as required by the specification.&lt;/P&gt;
&lt;P&gt;The response from the chip is always 01 (flags) 0F (error).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What the heck am I doing wrong here?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 21:38:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317028#M14046</guid>
      <dc:creator>F938FAFFA317AB</dc:creator>
      <dc:date>2026-02-13T21:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: NTAG 5 Link AUTHENTICATE command only errors 0F</title>
      <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317034#M14047</link>
      <description>&lt;P&gt;For more information, here is the response to&amp;nbsp;NXP GET SYSTEM INFO (0xAB);&lt;/P&gt;&lt;P&gt;Command sent: 02 AB 04 (flags, command, manufacturer code)&lt;/P&gt;&lt;P&gt;Response received: 00 00 20 00 FF F1 07 64&lt;/P&gt;&lt;P&gt;Byte 0 (0x00) — Response Flags&lt;BR /&gt;Success, no error.&lt;/P&gt;&lt;P&gt;Byte 1 (0x00) — Protection Pointer Address&lt;BR /&gt;Block address 0x00 (protection starts at block 0).&lt;/P&gt;&lt;P&gt;Byte 2 (0x20) — Protection Pointer Condition&lt;BR /&gt;- Bit 5 (WH) = 1: Page 0-H IS write protected&lt;BR /&gt;- Bit 4 (RH) = 0: Page 0-H is NOT read protected&lt;BR /&gt;- Bit 1 (WL) = 0: Page 0-L is NOT write protected&lt;BR /&gt;- Bit 0 (RL) = 0: Page 0-L is NOT read protected&lt;/P&gt;&lt;P&gt;Byte 3 (0x00) — Lock Bits&lt;BR /&gt;All features unlocked (PP area, DSFID, EAS, AFI all modifiable).&lt;/P&gt;&lt;P&gt;---&lt;BR /&gt;Bytes 4-7 — Feature Flags&lt;/P&gt;&lt;P&gt;Byte 4 (0xFF) — Features Set 0:&lt;BR /&gt;- Customer ID (CID) — Supported&lt;BR /&gt;- EAS IR (extended inventory) — Supported&lt;BR /&gt;- Inventory Read Extended Mode — Supported&lt;BR /&gt;- AFI Protection — Supported&lt;BR /&gt;- EAS Protection — Supported&lt;BR /&gt;- EAS ID — Supported&lt;BR /&gt;- NFC Counter — Supported&lt;BR /&gt;- User Memory Protection — Supported&lt;/P&gt;&lt;P&gt;Byte 5 (0xF1) — Features Set 1:&lt;BR /&gt;- High Bitrates — Supported&lt;BR /&gt;- Write CID — Supported&lt;BR /&gt;- DESTROY Feature — Supported&lt;BR /&gt;- NFC Privacy Mode — Supported&lt;BR /&gt;- Persistent Quiet — Not supported&lt;BR /&gt;- Originality Signature — Supported&lt;/P&gt;&lt;P&gt;Byte 6 (0x07) — Features Set 2:&lt;BR /&gt;- Key Privileges — Supported&lt;BR /&gt;- Mutual Authentication (MAM) — Supported&lt;BR /&gt;- Tag Authentication (TAM) — Supported&lt;/P&gt;&lt;P&gt;Byte 7 (0x64) — Features Set 3:&lt;BR /&gt;- Extended Flags — None&lt;BR /&gt;- Interface — GPIO and I2C (11b)&lt;BR /&gt;- Number of Keys — 4&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 10:21:53 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317034#M14047</guid>
      <dc:creator>F938FAFFA317AB</dc:creator>
      <dc:date>2026-02-12T10:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: NTAG 5 Link AUTHENTICATE command only errors 0F</title>
      <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317401#M14052</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/259858"&gt;@F938FAFFA317AB&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Hope you are doing well.&lt;/P&gt;
&lt;P&gt;Based on GET NXP SYSTEM INFO response, I can see that your NTAG 5 Link variant is AES capable.&lt;/P&gt;
&lt;P&gt;By any chance, is your Reader adding the proper CRC16 to the Authentication command frame?&lt;/P&gt;
&lt;P&gt;This may be a basic question; did you provide a valid AES Key before locking the Key being used? Are you able to authenticate with a different KeyID?&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Eduardo.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 21:33:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317401#M14052</guid>
      <dc:creator>EduardoZamora</dc:creator>
      <dc:date>2026-02-12T21:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: NTAG 5 Link AUTHENTICATE command only errors 0F</title>
      <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317452#M14056</link>
      <description>&lt;P&gt;Hi Eduardo,&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt;&amp;nbsp;By any chance, is your Reader adding the proper CRC16 to the Authentication command frame?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Yes I am primarily using an ACR1552U, however I have tested using an HID OmniKey 5022CL as well as an Android 14 application sending the same commands and getting the same 0F error response.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;did you provide a valid AES Key before locking the Key being used? Are you able to authenticate with a different KeyID?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Yes, for ease of testing, key0 is set to all AA bytes, key1 is set to all BB bytes, etc. I first set the operational mode to AES because if you attempt to write keys prior to this, only key0 and part of key1 will retain the data. After writing keys, reading them back, power cycling the chip (removing and placing back on the reader), and reading again, only then did I activate each key. I have tried to send MAM1 and TAM1 via AUTHENTICATE (35h) and specified all keys (00, 01, 02, 03) and all attempts return the same 0F error response. Furthermore, I have tried&amp;nbsp; TAM1 via unaddressed mode CHALLENGE with 250ms delay and READBUFFER and the data returned appears random and does not decrypt to the correct response.&lt;/P&gt;&lt;P&gt;I am at a loss. I have used multiple NTAG 5 link chips embedded in our product, and even chips on test boards -&amp;nbsp;&lt;A href="https://www.mikroe.com/ntag-5-link-click" target="_blank"&gt;NTP5332 NFC Tag Click board™ | NTAG 5 Link Click&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 00:42:38 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2317452#M14056</guid>
      <dc:creator>F938FAFFA317AB</dc:creator>
      <dc:date>2026-02-13T00:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: NTAG 5 Link AUTHENTICATE command only errors 0F</title>
      <link>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2318055#M14061</link>
      <description>&lt;P&gt;A little more progress... I have switched to using the HID OmniKey 5022 CL reader since transparent transceive commands are a little more straightforward using it. I was able to use the AUTHENTICATE command to send a TAM1 challenge and receive a response. The MAM1 still returns error 0F however.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sadly MAM1 still fails with 0F response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Response:&lt;BR /&gt;0000010F9000&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 21:39:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NTAG-5-Link-AUTHENTICATE-command-only-errors-0F/m-p/2318055#M14061</guid>
      <dc:creator>F938FAFFA317AB</dc:creator>
      <dc:date>2026-02-13T21:39:43Z</dc:date>
    </item>
  </channel>
</rss>

