Semtech, in its commitment to enhance user experience and streamline content, has successfully integrated the LoRa Developer Portal content into Semtech.com. As a result of this consolidation effort, the LoRa® Developer Portal will be discontinued on May 1st. After this date, you will be automatically redirected to Semtech.com.
For any technical support related to LoRa, please feel free to reach out to our experts here. If you have sales inquiries, please contact us here.
documentation

Security Keys

Security keys are the basis of maintaining data and device integrity. LoRaWAN relies on a unique security key for each end-device to minimize the damage of a stolen key. Therefore, it is not acceptable to use the same root key on multiple devices. Additionally, root keys cannot be based on DevEUI or any other easily-guessed scheme. Keys should not be all zeros or all ones. To obtain security keys, use a state-of-the-art cryptographic process that allows minimal transport of keys in plain text. Nonces and other methods used to generate keys should vary based on blocks of devices. For example, you can change the inputs, such as nonce values, for key generation every 64,000 devices. You can also use an alternate JoinEUI to ease the burden of looking up the exact input needed to regenerate the key, if required.