- Getting Started
- Trusted Platform Module
- Design Partners
Hardened TLS Benefits
Mitigate remote attacks, use a unique trusted identity
Transport Layer Security 1.2 (TLS 1.2) has become the de facto standard for connecting embedded systems to a network. While TLS 1.2 is undeniably robust, an embedded system still requires a unique, secure and trusted identity to prevent large-scale remote attacks. For example, a malicious attack can cause a hospital power grid to go down and potentially risk human lives, interrupt online services and advertising activities resulting in a loss of revenue, or suspend the production capabilities of industrial plants and their supply chains to almost instantaneously affect their profitability. When combined with the TLS 1.2 protocol, Microchip’s ATECC508A CryptoAuthentication™ device offers a unique, trusted, and verifiable identity that can help protect billions of connected devices
How do Microchip's CryptoAuthentication devices help enhance TLS?
By physically isolating keys and secrets from the application
Secure Key StorageIn order to harden the TLS protocol, trust in the system, the device provider, the manufacturer must be optimum to decrease potential backdoors and threats. The main philosophy is to completely isolate keys and secrets from any software exposure at any point of time of the product development as well as when the product is in the user’s hands. The ATECC508A is your solution.
Physical ProtectionMicrochip ECC based devices integrate various vital physical protection schemes to strengthen your TLS security at the root of the hardware design. The ECC based secure element family is architected with anti-tampering features such as active shield and side attack counter measures as well as robust secure key storage with locking mechanisms.
Hardware CryptographyIn terms of cryptography, the most important function is to provide a high entropy FIPS compliant random number generators (RNG). The ATECC family integrates best in class RNG enabling high entropy capabilities. In addition, the device is capable of providing both an ECC hardware accelerator and SHA256 hashing as well as a unique serial number per device.
Trusted ProvisioningTrust cannot rely only on the hardware device but also on the manufacturing process. Exploiting 3rd party weaknesses is one of the top target of hackers. Isolating keys and secrets from manufacturing is equally vital. Customers can now leave this burden to Microchip secure factories and leverage our trusted provisioning service already used by thousands of companies.
- Hardware based root of trust based on X509 certificate
- Public Key Infrastructure (PKI)
- ECC hardware accelerator
- ECDHE-ECDSA sign
- Tamper resistant
- Keys are never sent, exposed, nor disclosed
|Evaluation Kit for the Microchip CryptoAuthentication™ ATSHA204A, ATAES132A, and ATECC508A Devices|
|CryptoAuth Xplained Pro ||Evaluation and development extension platform for embedded Microchip ATSHA204A, ATAES132A, and ATECC508A design applications|
|AT88CKSCKTSOIC-XPRO ||The AT88CKSCKTSOIC-XPRO is an XPRO extension board that attaches 8-pin SOIC CryptoAuthentication devices to Microchip MCU's that support an XPRO interface. All Microchip Crypto Authentication devices regardless of interface can be used with this board.|
|AT88CKSCKTUDFN-XPRO ||The AT88CKSCKTUDFN-XPRO is an XPRO extension board that attaches 8-pin UDFN CryptoAuthentication devices to Microchip MCU's that support an XPRO interface. All Microchip Crypto Authentication devices regardless of interface can be used with this board.|
|ATXPANDER-XPRO ||The ATXpander-XPRO passively expands an XPRO extension header from a single kit to up to 3 kits. The board also allows for easy wiring modifications to be made if so required.|
|AT88CKECC-AWS-XSTK ||AWS Zero Touch Secure Provisioning Kit |
|AT88CK101 Development Kit ||Single socket secure authentication development kit for the Microchip ATSHA204A, ATECC508A, and ATAES132A CryptoAuthentication™ devices. Supports the Xplained Pro series. |
|Part of the Microchip Certified-ID platform, these USB module kits are used for provisioning Microchip ECC-based devices during production of boards/products. |
|Microchip Hardware-TLS Platform ||Microchip Hardware-TLS software libraries for wolfSSL and OpenSSL enable hardware-based elliptic curve mutual authentication for TLS using the ATECC508A Crypto co-processor. With Microchip HW-TLS support libraries, system designers using wolfSSL or OpenSSL can take advantage of Microchip Crypto hardware to enable strong mutual authentication between communicating devices as well as store keys, certificates and other sensitive data in a protected hardware storage.|
|Software library support for the ATSHA204A, ATECC108A, and ATECC508A CryptoAuthentication devices written in C.|
|Microchip Crypto Evaluation Studio (ACES) ||The ACES package is a suite of software tools to configure and demonstrate the Microchip CryptoAuthentication Family of devices using various evaluation kits. |