USER MANUAL
ESRPB / EDRPB - EASYFIT BLUETOOTH® SINGLE / DOUBLE ROCKER PAD
© 2018 EnOcean | www.enocean.com
F-710-017, V1.0
ESRPB / EDRPB User Manual | v1.3 | Jan 2018 | Page 64/68
B.6
Examples
The following four chapters give step by step examples based on one actual device and 0 /
1 / 2 or 4 byte of optional data.
At the time of writing, a suitable online AES calculator could be found here:
http://testprotect.com/appendix/AEScalc
Likewise, a suitable XOR calculator could be found here:
B.6.1
Data telegram without optional data
For this example, we consider the following telegram payload received from a PTM 215B
with the source address
E215000019B8
and security key
3DDA31AD44767AE3CE56DCE2B3CE2ABB
:
0C FF DA 03 5D 04 00 00 11 B2 FA 88 FF
The last four bytes of this payload (
B2 FA 88 FF
) are the sender-provided signature which
has to be authenticated (compared against the signature the receiver calculates based on
its own security key).
The variable input parameters are therefore the following:
Parameter
In this example
Source Address
B819000015E2 (little endian representation of E215000019B8)
Input Data
0CFFDA035D04000011
Input Length
0x0009
Sequence Counter
5D040000
Security Key
3DDA31AD44767AE3CE56DCE2B3CE2ABB
The constant internal parameters are always the same:
Parameter
In this example
A0_Flag
0x01
(always)
B0_Flag
0x49
(always)
i
0x0000
(always)
Based on variable input data and constant internal algorithm parameters, we can now de-
rive the following variable internal parameters:
Parameter
In this example
Nonce
B819000015E25D040000000000
A0
01B819000015E25D0400000000000000
B0
49B819000015E25D0400000000000000
B1
00090CFFDA035D040000110000000000