- Trust Platform
- Mature Products
- Design Partners
Secure Boot use case with ATECC608A
Why would you use a secure element for Secure Boot ?
This solution is archived and will no longer be updated. We recommend that you use the TrustFLEX ATECC608A-TFLXTLS instead.
Very often the intellectual property (IP) of an embedded product lives within the code of the microcontroller. In today's market place, it only takes a few weeks to extract that code despite the usage of traditional "code protect" features. At a moderate expense, many third party options are widely available on the internet who are capable to obtain HEX files from the microcontroller. This type of conterfeit puts in danger companies IP and could consequently lead to significant revenue loss or open various backdoors to malicious firmware.
Validate your application code with a trusted secure element
Secure Boot for small microcontrollers
20 Years of Experience in Secure Provisioning
Microchip is here all the way through
Trust cannot rely only on the device but also on the manufacturing process. Exploiting third party weaknesses is one of the top targets for hackers. Isolating keys and secrets from manufacturing is equally vital. Customers can leave this burden to Microchip's secure factories and leverage our trusted provisioning service already used by thousands of companies.
- Educate yourself about the secure boot use case using a secure element
- Understand why private key isolation is vital to your design
- Learn how to code with CryptoAuthLib library
- Learn how to configure the memory zone and set your expected policies
- All the provisioning – keys/certificates generation and manipulation is done within Microchip secure factories
- Public key are protected and immutable in the ATECC608A
- Elimination of any software or manufacturing backdoors
- The device ships pre-provisioned with the secrets