USER MANUAL
ESRPB / EDRPB - EASYFIT BLUETOOTH® SINGLE / DOUBLE ROCKER PAD
© 2018 EnOcean | www.enocean.com
F-710-017, V1.0
ESRPB / EDRPB User Manual | v1.3 | Jan 2018 | Page 58/68
B
Authentication of ESRPB / EDRPB data telegrams
ESRPB / EDRPB provide the option to authenticate its data telegrams as described in chap-
ter 4.8. The authentication mechanism used by the PTM 215B module in ESRPB / EDRPB is
standardized as RFC3610. The full RFC3610 specification could be found here at the time of
writing
and
should
be
used
as
primary
source
of
information:
https://www.ietf.org/rfc/rfc3610.txt
The following description aims to summarize the security processing steps for users not
deeply familiar with cryptography in general or RFC3610 in particular.
B.1
Algorithm input parameters
The purpose of the security processing in PTM 215B is to calculate a unique signature that
can be used to verify authenticity (telegram has not been modified) and originality (tele-
gram comes from the assumed sender) of a telegram.
To do so, two types of algorithm parameters are required:
Constant algorithm input parameters
These parameters identify high level algorithm and telegram properties and are the
same for any PTM 215B telegram
Variable algorithm input parameters
These parameters identify telegram-specific parameters and therefore depend on
the specifics of the transmitted telegram
B.1.1
Constant input parameters
The RFC3610 implementation in PTM 215B requires two constant input parameters:
Length field size
This is the size (in byte) of the field used to encode the length of the input data
(which is the payload to be authenticated).
The maximum size of PTM 215B payload to be authenticated is 13 byte; therefore
one byte would be easily sufficient to encode the payload size. The minimum value
permitted by the standard is however 2 bytes which is therefore chosen.
Signature size
This is the desired size of the generated signature which is 4 byte for PTM 215B
Parameter
Comment / Description
Example
Length
Field Size
Size (in bytes) of the field used to
encode the input length
2
(always, minimum permissible size)
Signature
Size
Desired size (in byte) of the signa-
ture generated by the algorithm
4
(always)
Table 6 – Constant algorithm input parameters