De(K
R
)
Xor
Xor
En(K
L
)
En(K
L
)
ODATA
1
IDATA
1
IDATA
2
Xor
IDATA
3
ODATA
2
……
En(K
L
)
IDATA
n
ODATA
n
En(K
L
)
Authcode
En(K
L
)
For Example
:
The command of downloading Master Key is“80 0b 00 82 01 AuthCode(8byte) EDC”.
The random number retrieved is 01 02 03 04 05 06 07 08.
The UID is 88 88 88 88 88 88 88 88 11 11 11 11 11 11 11 11
Subdirectory authentication key is 01 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 10.
The process of authentication code calculation is as follows:
First, put related data field, random number and UID together with 0x00 to form a 8-bits
data block.
00 82 01 01 02 03 04 05 06 07 08 88 88 88 88 88 88 88 88 11 11 11 11 11 11 11 11 00
00 00 00 00.
The detailed calculation process is:
1)
En (00 82 01 01 02 03 04 05)
:
Using Left Key “01 23 45 67 89 ab cd ef” to
encrypt the first 8-bits data block; the result is
ED73367277363FD6.
2)
Use ED73367277363FD6 to XOR the second 8-bits data block “06 07 08 88 88
88 88 88”; the result is EB743EFAFFBEB75E.
3)
En (EB743EFAFFBEB75E)
:
Using the Left Key “01 23 45 67 89 ab cd ef” to
encrypt; the result is B7A8FA11AD4E63B0.
4)
Using B7A8FA11AD4E63B0 to XOR the third 8-bits data block “88 88 88 11
11 11 11 11”; the result is 3F207200BC5F72A1.
Summary of Contents for NL-PP60
Page 1: ......