Crypto: Spake2+

The Spake2+ sample demonstrates how to do a password-authenticated key exchange using the Spake2+ protocol.

Requirements

The sample supports the following development kits:

Hardware platforms

PCA

Board name

Build target

nRF9161 DK

PCA10153

nrf9161dk_nrf9161

nrf9161dk_nrf9161_ns nrf9161dk_nrf9161

nRF9160 DK

PCA10090

nrf9160dk_nrf9160

nrf9160dk_nrf9160_ns nrf9160dk_nrf9160

nRF54L15 PDK

PCA10156

nrf54l15pdk_nrf54l15

nrf54l15pdk_nrf54l15_cpuapp_ns nrf54l15pdk_nrf54l15_cpuapp

nRF54H20 DK

PCA10175

nrf54h20dk_nrf54h20_cpuapp

nrf54h20dk_nrf54h20_cpuapp

nRF5340 DK

PCA10095

nrf5340dk_nrf5340

nrf5340dk_nrf5340_cpuapp_ns nrf5340dk_nrf5340_cpuapp

nRF52840 DK

PCA10056

nrf52840dk_nrf52840

nrf52840dk_nrf52840

Overview

The sample performs the following operations:

  1. Initializes the Platform Security Architecture (PSA) API.

  2. Goes through the steps for Spake2+ on server and client sides.

  3. Verifies that the derived keys are the same.

Building and running

Testing

After programming the sample to your development kit, complete the following steps to test it:

  1. Connect to the kit with a terminal emulator (for example, nRF Connect Serial Terminal). See Testing and optimization for the required settings and steps.

  2. Compile and program the application.

  3. Observe the logs from the application using a terminal emulator.