We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest. Update Here
Stay in the loop with the latest from Microchip. Update your profile while you are at it. Update Here
Complete your profile to access more resources. Update Here

CryptoAuthentication™ Family

What Is the CryptoAuthentication Family?


Our CryptoAuthentication™ ICs deliver robust, hardware-based security that keeps secret cryptographic keys safe from unauthorized access. These compact, low-power devices integrate easily with any microcontroller (MCU) or microprocessor (MPU), making them excelent options for securing IoT nodes across applications like home automation, medical devices and wearables. They also ensure the authenticity of disposable and accessory devices, helping prevent counterfeiting and protecting your product integrity, users and revenue.

CryptoAuthLib Library


To streamline your development process with CryptoAuthentication devices like the ATECC608, ATSHA204A, ECC204, ECC206, SHA104, SHA105, SHA106, TA010 (automotive qualified) or ATSHA206A, we offer the CryptoAuthLib library. This software support library, written in C code, is essential for integrating cryptographic services into any application or device driver. It is compatible with a range of platforms, including Arm® Cortex®-M-based microcontrollers, PIC® microcontrollers and PCs that run Windows® or embedded Linux®.

CryptoAuthentication™ Secure Key Storage

Key Attributes

  • Easy to use: Basic Application Programming Interface (API) serves the needs of most applications
  • Powerful: Core API makes the full power of the device available for sophisticated applications and developers
  • Portable: Runs on small processors and desktop systems
  • Extensible: Designed to easily support new microcontroller platforms or protocols
  • Flexible: Includes APIs for storing, retrieving and manipulating X.509 certificates and for Transport Layer Security (TLS) integration

If you need assistance during your design and development process, visit our technical support portal to find helpful resources and get assistance from our security experts. Our approved security design partners also offer expertise with TLS stack providers, cloud platforms, certificate authority companies and the CryptoAuthLib library to help you quickly and cost effectively bring your product to market.

Applications


Accessory Authentication

Accessory Authentication 

Our CryptoAuthenticaion ICs can be used to implement a controlled accessory ecosystem strategy, a third-party certification program or accessory counterfeit prevention

Disposable

Disposable Authentication

Depending on the threat model your company identifies, you can leverage our CryptoAuthentication ICs to implement several secure authentication architectures to defend your products from counterfeiting.

Live Chat

Need Help?

Privacy Policy