Our CryptoAuthentication™ devices offer hardware-based secure storage to effectively keep secret keys hidden from unauthorized users. These small, very-low-power devices work with any microcontroller (MCU) or microprocessor (MPU) to provide flexible solutions for securing Internet of Things (IoT) nodes used in home automation, medical devices, wearables and many other applications. They can also be used to protect the authenticity of consumables and accessories, ensuring that only legitimate ones work with your product and preserving your revenue stream.
The optimized architecture of our CryptoAuthentication ICs is composed of hardware-based cryptographic accelerators to significantly reduce execution time and power consumption. A high-quality random number generator and EEPROM-based secure key storage are also embedded inside these devices. To provide extra security, they also come with physical anti-tampering and side-channel attack protections to block access to embedded system credentials.
Typical Use Cases:
Typical Use Cases:
Typical Use Cases:
If you need assistance during your design and development process, visit our Technical Support portal to find helpful resources and get assistance from our security experts. Our approved Security Design Partners also offer expertise with TLS stack providers, cloud platforms, certificate authority companies and the CryptoAuthLib library to help you quickly and cost effectively bring your product to market.
Product | Provisioning | Algorithm Type | Density | Standby Typical (uA) | Temp (C) | Packages |
---|---|---|---|---|---|---|
ATECC608B | ECC-P256 (ECDH and ECDSA), SHA256, AES128-GCM | 10.5Kb | 0.03 | -40 to 85 | ||
ATECC608B-TCSM | TrustCUSTOM | ECC-P256 (ECDH and ECDSA), SHA256, AES128-GCM | 10.5Kb | 0.03 | -40 to 85 | |
ATECC608B-TFLXTLS | TrustFLEX | ECC P256 (ECDH and ECDSA), SHA256, AES-GCM | 10.5Kb | 0.03 | -40 to 85 | |
ATECC608B-TNGACT | Trust&GO | ECC P256 (ECDH and ECDSA), SHA256, AES-GCM | 10.5Kb | 0.03 | -40 to 85 | |
ATECC608B-TNGLORA | Trust&GO | ECC-P256 (ECDH and ECDSA), SHA256, AES128-GCM | 10.5Kb | 0.03 | -40 to 100 | |
ATECC608B-TNGTLS | Trust&GO | ECC-P256 (ECDH and ECDSA), SHA256, AES128-GCM | 10.5Kb | 0.03 | -40 to 85 | |
ATSHA204A | SHA256 | 4.5Kb | 0 | -40 to 85 | CONTACT 3RB 3,SOIC 8S1 8,SOT23 3TS1 3,TSSOP 8X 8,UDFN 8MA2 8,XDFN 8MX1 8 | |
ATSHA204A-TCSM | TrustCUSTOM | SHA256 | 4.5Kb | 0 | -40 to 85 | |
ATSHA206A | SHA256 | 5 | 0.03 | -40 to 85 | ||
TA100 | ECC, RSA, AES, SHA, HMAC, CMAC | 15 | -40 to 125 |
Title | Download |
---|---|
AN_8984 - CryptoAuthLib: Driver Support for CryptoAuthentication Devices | Download |
AN_8983 - ATECC508A Node Authentication Example Using Asymmetric PKI | Download |
AN_8981 - CryptoAuthentication Encrypted Reads and Writes | Download |
AN_8977 - 3-lead CONTACT Package Usage | Download |
AN_8974 - ATECC Compressed Certificate Definition | Download |
AN_8971 - ATECC Production Provisioning Guide | Download |
AN_8936 - CryptoAuthentication Data Zone CRC Calculation | Download |
AN_8932 - ATECC508A Public Key Validation | Download |
AN_8864 - Migrating AT88SA102S to ATSHA204 | Download |
AN_8863 - Authentication Counting | Download |
AN_8860 - Secure Personalization with Transport Key Authentication | Download |
AN_8849A - ATSHA204 Command Sequences | Download |
AN_8847 - CryptoAuthentication SWI and I2C Interfaces Seamless Debugging Using Saleae Logic Analyzer | Download |
AN_8845 - ATSHA204A and ATECC508A Personalization Guide | Download |
AN_8843 - Generating Random Secrets: ATSHA204A, ATECC108A, and ATECC508A | Download |
AN_8842 - ATSHA204 Factory Default Test Data | Download |
AN_8841 - Unique Keys for ATSHA204 | Download |
AN_8834 - ATSHA204 Authentication Modes | Download |
AN_8826 - PCB Mounting Guidelines for Surface Mount Packages | Download |
AN_8794 - ATSHA204 Product Uses | Download |
AN_8788 - Secure Boot Simplified | Download |
AN_8777 - ATSHA204A Symmetric Session Encryption Key Exchange | Download |
AN_8754 - Application Brief: Analyzing Strength of Security | Download |
AN_8753 - Implementing Secure Boot with the ATSHA204 | Download |
AN_8752 - Using the ATSHA204 for Secure Password Operations | Download |
AN_8750 - ACES Overview | Download |
AN_8746 - Upgrading the CryptoAuthentication and Temperature Sensor Kit Firmware Using FLIP | Download |
AT17284: Proximetry Cloud Based Smart Plug User Guide | Download |
Title | Download |
---|---|
CryptoAuthentication Development and Evaluation Kit Selection Guide | Download |
ATSHA204A, ATAES132A, ATECC108A, and ATECC508A CryptoAuthentication Family | Download |
Hardware-TLS (HW-TLS) Hardening Transport Layer Security for IoT | Download |
ATAES132 - CryptoAuthentication Family of Hardware Security Solutions | Download |
ATECC508A Flyer | Download |
Title | Download |
---|---|
Security Provisioning Signer Module Kit User Guide | Download |
Security Provisioning Root Module Kit User Guide | Download |
CryptoAuth Xplained Pro Hardware User Guide | Download |
ATSHA204A and ATECC108A/508A Firmware Development Library User Guide | Download |
ATAES132A Firmware Development Library | Download |
AT88Microbase Hardware User Guide | Download |
AT88CK9000 User Guide | Download |
AT88CK490/590 Kits Quick Start User Guide | Download |
AT88CK490/590 Kits Hardware User Guide | Download |
AT88CK101 Development Kit Hardware User Guide | Download |
Title | Download |
---|---|
Security for Intelligent, Connected IoT Edge Nodes | Download |
RSA vs. ECC Comparison for Embedded Systems | Download |
Protecting People, Data and Profits with Security-Optimized Embedded Designs Part II | Download |
Protecting People, Data and Profits with Security-Optimized Embedded Designs Part I | Download |
Attack Methods to Steal Digital Secrets | Download |
256-Bit Key — Is It Big Enough? | Download |