NXP Semiconductors
UM10276_1
TED-Kit 2 User Manual
All information provided in this document is subject to legal disclaimers.
© NXP B.V. 2010. All rights reserved.
User manual
Rev. 1.29 — 20 August 2010
30 of 79
Fig 42. PKE tag scanning
5.6.5 Cyclic PKE authentication
Select one of the available tags. Enabling the
C
C
y
y
c
c
l
l
i
i
c
c
A
A
u
u
t
t
h
h
e
e
n
n
t
t
checkbox performs a cyclic
authentication using the HITAG2 crypto algorithm. The exchanged authentication values
will be displayed like shown in Fig 43a.
a. starting
b. stopping
Fig 43. PKE cyclic authentication
Disabling the
C
C
y
y
c
c
l
l
i
i
c
c
A
A
u
u
t
t
h
h
e
e
n
n
t
t
checkbox stops the cyclic authentication. Exchanged values
are no longer available (Fig 43b).