USER MANUAL
ESRPB / EDRPB - EASYFIT BLUETOOTH® SINGLE / DOUBLE ROCKER PAD
© 2018 EnOcean | www.enocean.com
F-710-017, V1.0
ESRPB / EDRPB User Manual | v1.3 | Jan 2018 | Page 20/68
4.8.1
Authentication implementation
ExRPB implements telegram authentication based on AES128 in CCM (Counter with CBC-
MAC) mode as described in IETF RFC3610. At the time of writing, the RFC3610 standard
could be found here:
https://www.ietf.org/rfc/rfc3610.txt
The 13 Byte CCM Nonce (number used once – unique) initialization value is constructed as
concatenation of 6 byte Source Address, 4 byte Sequence Counter and 3 bytes of value
0x00 (for padding).
Note that both Source Address and Sequence Counter use little endian format (least signifi-
cant byte first).
Figure 16 below shows the structure of the AES128 Nonce.
Figure 16 – AES128 Nonce structure
The AES128 Nonce and the 128 bit device-unique security key are then used to calculate a
32 bit signature of the authenticated telegram payload shown in Figure 17 below.
Figure 17 – Authenticated payload
The calculated 32 bit signature is then appended to the data telegram payload as shown in
Figure 13 in chapter 4.6.
In addition to the RFC3610 standard itself, please consult also Appendix A for a step by
step description of the authentication process.