<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: key diversification in NFC</title>
    <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860120#M4852</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As update, I have read AN10922 and AN10957.&amp;nbsp;That doesn't help with my core question: can I encrypt data on the AV2 chip using a key in the AV2 Keystore?&amp;nbsp; The only solution I've found is to set the flag for dumping the secret key, read the key back to the&amp;nbsp;host side, then using the NXP Reader Library to encrypt the data, all on the host side.&amp;nbsp; I'd rather not bring the key back to the host side ever. The AV2 certainly&amp;nbsp;has the capability of doing it all on the chip, it seems like a security risk to force the host to store the secret key with dump flag set (in fact, the documentation describing the keystore says exactly that).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Feb 2019 16:26:15 GMT</pubDate>
    <dc:creator>robneff</dc:creator>
    <dc:date>2019-02-20T16:26:15Z</dc:date>
    <item>
      <title>key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860118#M4850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm working on a card reader using the SAM AV2 chip that will read cards using key diversification.&amp;nbsp; I understand the diversification algorithm, but there are steps to "encrypt x using AES".&amp;nbsp; I assume AES is built into the AV2 chip, but I don't see commands to simply encrypt an input, using a key from the key store.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the NXP Reader library there is the phCryptoSym_Encrypt( ) command, that seems to implement AES in the library itself, but that means we need to get the key from the key store on the AV2 chip, which reduces the security level.&amp;nbsp; Am I looking at this right?&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.nxp.com/t5/tag/nxp reader/tg-p"&gt;#nxp reader&lt;/A&gt;‌ &lt;A href="https://community.nxp.com/t5/tag/sam av2/tg-p"&gt;#sam av2&lt;/A&gt;‌ &lt;A href="https://community.nxp.com/t5/tag/key diversification/tg-p"&gt;#key diversification&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2019 19:17:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860118#M4850</guid>
      <dc:creator>robneff</dc:creator>
      <dc:date>2019-02-13T19:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860119#M4851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your information : &lt;A class="link-titled" href="https://www.nxp.com/docs/en/application-note/AN10922.pdf" title="https://www.nxp.com/docs/en/application-note/AN10922.pdf"&gt;https://www.nxp.com/docs/en/application-note/AN10922.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2019 08:37:42 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860119#M4851</guid>
      <dc:creator>jimmychan</dc:creator>
      <dc:date>2019-02-19T08:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860120#M4852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As update, I have read AN10922 and AN10957.&amp;nbsp;That doesn't help with my core question: can I encrypt data on the AV2 chip using a key in the AV2 Keystore?&amp;nbsp; The only solution I've found is to set the flag for dumping the secret key, read the key back to the&amp;nbsp;host side, then using the NXP Reader Library to encrypt the data, all on the host side.&amp;nbsp; I'd rather not bring the key back to the host side ever. The AV2 certainly&amp;nbsp;has the capability of doing it all on the chip, it seems like a security risk to force the host to store the secret key with dump flag set (in fact, the documentation describing the keystore says exactly that).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2019 16:26:15 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860120#M4852</guid>
      <dc:creator>robneff</dc:creator>
      <dc:date>2019-02-20T16:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860121#M4853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rob&amp;nbsp;&lt;/P&gt;&lt;P&gt;You got the answer on the internal thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Vicente&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2019 17:19:42 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860121#M4853</guid>
      <dc:creator>vicentegomez</dc:creator>
      <dc:date>2019-02-26T17:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860122#M4854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That did work for me.&amp;nbsp; I thought these forums were password protected, but at any rate, I did get the response off-line and it worked for me.&amp;nbsp; If I had read AN1830 or picked up some clues in other docs, that would have helped me also.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2019 00:12:27 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860122#M4854</guid>
      <dc:creator>robneff</dc:creator>
      <dc:date>2019-03-08T00:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/860123#M4855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vicente:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same question that Rob have, can you please help me?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Roberto Rebolledo.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 May 2019 16:06:03 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/860123#M4855</guid>
      <dc:creator>robertorebolled</dc:creator>
      <dc:date>2019-05-02T16:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: key diversification</title>
      <link>https://community.nxp.com/t5/NFC/key-diversification/m-p/1490463#M9559</link>
      <description>&lt;P&gt;Where is the internal thread?&lt;/P&gt;&lt;P&gt;I am trying to diversify as well av2 key but I am not able to dump it either. Any help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AuthAV2key is false for master and key dump is allowed. CuK is ff and type picc. What I am doing wrong? Resp 6985&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jul 2022 16:32:38 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/key-diversification/m-p/1490463#M9559</guid>
      <dc:creator>Anssi</dc:creator>
      <dc:date>2022-07-15T16:32:38Z</dc:date>
    </item>
  </channel>
</rss>

