Skip to main content

Usage Flow

Follow the steps below to configure the message authentication feature.

Security Setting

  1. Open the Security Window

    After installing the Message Authentication plug-in in MicroPeckerX Control Software, a “Security Window” becomes available. Open the Security Window from the menu or toolbar.

    Security Window
  2. Open the Security Setting dialog

    Click the tab of the channel you want to configure. Then click the “Security Setting” button to open the Security Setting dialog.

    Security Window 2

Channel Settings

Configure channel-wide message authentication settings on the Ch Setting tab.

  1. Open the Ch Setting tab
    Click the Ch Setting tab in the Security Setting dialog.

    Ch Setting
  2. Select a profile
    Choose the security profile for message authentication from the Profile dropdown.

    Profile menu
  3. Enable message authentication
    Select the “Use Message Authentification” checkbox to enable message authentication.

    Use Message Authentication
  4. Configure FV Master/Slave
    Use the “FV Master” checkbox to set the FV role. Select it for a master, or clear it for a slave.

    FV Master
  5. Configure SyncFrame
    Use “SyncFrame Setting” to configure the sync message.

    SyncFrame Setting
  6. Configure MAC Type
    In “MAC Type Setting,” specify the MAC bit position in the data field and how to generate the key. If you use a fixed key, enter the value here.

    MAC Type Setting
  7. Configure the FV
    Use “FV Setting” to enable or disable FV. When enabled, specify the FV bit position in the data field.

    FV Setting
  8. Configure MAC Source: Prefix
    “MAC Source Setting” defines how the MAC input is generated.

    When Profile = Jaspar

    If you select “Jaspar,” the elements are preconfigured to match the message ID specification. Enter only the initial values.

    MAC Source (Jaspar)
    When Profile = Custom

    If you select “Custom,” configure the prefix bit length, elements (name, bit position, initial value, etc.), and generation method.

    MAC Source (Custom Prefix)
  9. Configure MAC Source: Payload
    In “CAN/CAN-FD Payload,” enable or disable the payload input and specify its bit position in the data field.

    MAC Source Payload
  10. Configure MAC Source: FV

    When Profile = Jaspar

    If you select “Jaspar,” the FV elements are preconfigured. Enter the initial values only.

    MAC Source (Jaspar FV)
    When Profile = Custom

    If you select “Custom,” configure the postfix bit length, elements (name, bit position, initial value, etc.), and generation method.

    MAC Source (Custom FV)

ID Settings

Configure message authentication per CAN ID on the ID Setting tab.

  1. Open the ID Setting tab
    Click the ID Setting tab in the Security Setting dialog.

    ID Setting
  2. Add an ID setting
    Click the Plus button button to add a message authentication setting for a CAN ID.

  3. Configure Target Frame Info
    For each ID, use Target Frame Info to configure the frame details (CAN ID, transmit cycle, offset, etc.). To configure a periodic transmit frame, set Mode to “Periodic.” If the ID acts as an FV master, enter the message ID in the “ID” field.

    Target Frame Info
  4. Use Ch Setting
    Clear the “Use Ch Setting” checkbox if you do not want to use the channel-wide settings. The Security Setting fields appear so you can configure authentication for the selected ID.

    ID Security Setting
  5. Configure all IDs
    Repeat steps 2 to 4 for each CAN ID that requires message authentication.

  6. Close the Security Setting dialog
    After completing all configurations, click “OK” to close the dialog.

Monitoring

The Security Window displays communication logs for security frames.

  1. Enable Security Mode
    On each channel tab in the Security Window, select “Security Mode Enabled.” Message authentication is now active.

    Security Mode
  2. Start monitoring
    After configuring the settings, click Start button on the main window to begin monitoring CAN/CAN FD communication.

Security Window During Monitoring
Security Window log

All transmitted and received security message logs appear in the Monitor Window and Security Window. In the Security Window, you can review the prefix and postfix for each log entry (or Message ID and FV when using the JASPAR profile).

Security Window After Monitoring
Security Window log summary