Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

CryptoAuthentication™ Devices

Microchip CryptoAuthentication devices offer hardware-based ultra secure key storage to ensure that a product with the consumables it uses, firmware it runs, accessories that supports it, and the network nodes it connects to are not cloned, counterfeited, or tampered with. Keeping products genuine helps maintaining a customer revenue flow by ensuring that only legitimate products can work with the host system. Microchip offers the industry's widest selection of authentication devices featuring hardware-based root of trust storage and cryptographic countermeasures that can fight off even the most aggressive attacks. Because attackers cannot see secret keys that are stored in protected hardware, they cannot attack. To help your design journey, Microchip approved Security Design Partners are here to help you scale with TLS stack providers, Cloud experts, Certificate Authority companies and CryptoAuthLib library expertise.
  • Generic TLS implementation
  • Public Key Infrastructure (PKI)
  • ECC hardware accelerator
  • Anti Tampering
  • TLS stack partners
Public Cloud
  • Private key isolation from software backdoors
  • In-manufacturing key Provisioning service
  • Mutual Authentication
  • Cloud Partner Use Cases
Counterfeit Protection
  • ECC/SHA/AES hardware accelerators
  • Anti Tampering
  • Secure boot
  • Anti-Cloning
  • Security design partner network
For any support on the CryptoAuthentication devices, submit your request at http://www.microchip.com/support/hottopics.aspx