Microchip logo
Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

Security Solutions with 32-bit Microcontrollers

With the rapid adoption of connected nodes, cloud-based infrastructure and the increasing frequency of security threats, security in embedded systems is a necessity. When it comes to security, customers have needs that scale depending on the types of security needed, cost of implementation, level of risk tolerance and ease of development. To meet these needs, Microchip’s 32-bit microcontrollers (MCUs) have some of the most comprehensive and scalable security solutions in the market. These solutions include a comprehensive ecosystem with hardware, software, tools and functions which make effective protection for embedded applications simple to implement.

32-bit MCU Security Ecosystem

Hardware

Security begins with hardware. Our 32-bit MCU security portfolio has integrated hardware-based security features. Hardware-based security is faster, has higher performance and is more secure than software-only solutions.

  • Diverse security features and functions can be combined to meet your application’s unique security needs
  • Industry’s first low-power MCU with Arm® Trustzone® for secured partitioning
  • MCUs can also be hardened with the addition of a secure element
Tools and Software

Save time by starting your design process with our award-winning development ecosystems for 32-bit MCU’s, MPLAB® Harmony and Atmel START. We also provide comprehensive cryptographic/security software support across development platforms.

  • Flexible, modular and robust embedded development environment with extensive software support
  • Support for cryptographic algorithms, TLS /Wi-Fi® stack fully integrated with hardware and demos for rapid prototyping
Third-Party Integration

Security measures can be further reinforced with third-party security software. We’ve worked with several third parties to provide easy-to-use security development options.  

  • Arm TrustZone enablement software abstracts away complex security implementation and provides a simple smart user interface to securing embedded applications
  • Software supports secure key provisioning and life cycle management
  • Application Programing Interface (API) for common use cases like IP protection, cloud onboarding and anti-cloning

Security Functions

Our microcontrollers provide a variety of security functions that can be customized to meet a wide range of protection needs. 

Symmetric Cryptography (Secret Key)
+

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

Asymmetric Cryptography (Public Key)
+
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
Integrity Check Monitors (Message Hash)
+
Message hashes transform variable-length data to a fixed-length piece of data. Integrity check monitors generate and validate message hash to preserve data integrity.
Hardware Root of Trust (Secure Boot)
+
A microcontroller that starts executing software from an internal, immutable memory (For example, ROM). The software stored in the microcontroller is considered inherently trusted (i.e., the root of trust) because it cannot be modified.
Secure Firmware Upgrade (Secure Bootloader)
+
A small section of code is added to the main application stored in the Flash of the MCU to provide the ability to download firmware upgrades. This code is called a bootloader, as its role is to load a new program at boot. Securing this code is essential to protect IP, assets and remote attacks and is the essential feature of secure bootloader.
True Random Number Generator
+
Hardware-based random generator offering a higher source of entropy for the generation of keys used in cryptographic applications.
Tamper Detection
+
Ability of a device to sense that an active attempt (mostly physical) to compromise the device integrity or the data associated with the device is active. The MCU can be programmed to take appropriate defensive actions upon detection.
Secure Key Storage
+
Protecting nonvolatile and volatile keys from remote and physical attacks.
Key Provisioning
+
Injection of secret identity data and cryptographic keys in a secure environment to maintain authenticity and integrity of an embedded application.
Hardware Isolation/IP Protection/Trustzone
+
Hardware-enforced isolation between the trusted and the untrusted resources of an application enabling IP protection.

Featured 32-bit MCUs for Security

SAM L11
Industry-leading security in its performance class
  • Industry’s first Arm® Cortex®-M23 with robust chip-level security features and Arm TrustZone
  • Integrated hardware-based security in a small MCU
  • Comprehensive security software and support framework
  • Supports a host of security functions including secure boot, secure firmware upgrade, hardware isolation, secure IO, IP protection, tamper protection, key provisioning solutions and key protection
  • Industry-leading low-power performance
Learn More
SAM D5x/E5x
Mid-performance MCU with highly-integrated security
  • Arm Cortex-M4F with asymmetric and symmetric crypto accelerators
  • Public Key Cryptographic Controller (PUKCC) supporting RSA/ECC algorithms
  • Secure bootloader support
  • Integrity check monitors supporting Secure Hash Algorithms (SHA)
  • Excellent connectivity options including Ethernet and CAN-FD
Learn More

CEC1302 and CEC1702
Enable secure boot and updates of system firmware, providing an immutable identity and a root of trust

  • Easy-to-use authentication, private key and customer programming flexibility to minimize customer risk
  • Securely boot your system firmware
  • Reduce compute time with the robust hardware cryptographic cipher suite
  • Programming flexibility to minimize customer design risk
  • Easy-to-use encryption, authentication, private and public key capabilities
Learn More