中文
Contact us
Contact us
Tel:0755-23709800
Fax:0755-29126261
Mobile:188-1973-0290
E-mail:joy@xinruidz.com
Address:Shenzhen Baoan Xixiang Baoyuan Road, No. 2002 Haihong Industrial Zone Central Avenue Building A
Microchip Launch ATECC608A CryptoAuthentication™ New device
Article Source:Xinrui Electronics  Visitors:1156  Time:2018-01-26

From remote network attacks to the manufacture of counterfeit products, the spread of security threats is becoming more widespread, affecting all industries. To prevent these threats, Microchip Technology Inc. (Microchip Technology Inc.) announced the availability of the ATECC608A CryptoAuthentication ™ device, which developers can use to add hardware-based security features to their designs.


blob


From remote network attacks to the manufacture of counterfeit products, the spread of security threats is becoming more widespread, affecting all industries. The success of these threats, which means that the cost of recovery, the huge loss of service revenue, of course, the most obvious is the loss of brand equity. Therefore, it is critical that powerful security features be implemented in new and existing designs to protect intellectual property (IP) and enable trusted authentication of networked devices. To prevent these threats, Microchip Technology Inc. (Microchip Technology Inc.) announced the release of the ATECC608A CryptoAuthentication device, which developers can use to add hardware-based security features to their designs. Microchip also has a Security Design Partner Program to help developers connect with third-party partners to enhance and accelerate security design.

 

 

The basis of secure communications is the ability to create, secure and authenticate the device's unique and trusted identity. By separating the device's private key from the system, placing it in a secure area, and incorporating industry-leading encryption, the ATECC608A provides a high level of security that can be used in almost any type of design. Key features of the ATECC608A include:

blob

Best-in-Class Key Generation: Federal Information Processing Standards (FIPS) compliant random number generator (RNG) generates a unique key that meets the latest requirements of the National Institute of Standards and Technology (NIST) for FIPS certification of the entire system Provide a more simple way.

Boot Authentication for Small Systems: The new commands facilitate signature verification and summary calculations for firmware on main MCUs that use systems such as ARM® Cortex®-M0 + and more robust embedded systems.

Trusted Certifications for LoRa Nodes: The AES-128 engine enables secure deployment of the LoRa infrastructure by enabling authentication of trusted nodes in the network.

Fast Encryption Processing: Hardware-based integrated elliptic curve cryptography (ECC) algorithms enable faster, more secure creation of smaller keys and establishment of a certificate-based trusted root compared to other implementations that rely on traditional methods.

Tamper Protection: Tamper Protection protects keys from physical attacks and prevents intrusion attempts after deployment. These technical support systems store secure and trusted identity information.

Trusted Manufacturing Configurator: Companies can use Microchip's secure manufacturing facilities to securely configure their keys and certificates, thereby eliminating the risk of compromising the manufacturing process.

 

 

Specific chip-related features:

 

n Cryptographic co-processor with secure hardware key storage.

n 16 keys, certificates or data can be saved.

n Hardware Support Asymmetric Signature, Authentication, Critical Protocol - ECDSA: FIPS186-3 Elliptic Curve Digital Signature.

n ECDH: FIPS SP800-56A Elliptic Curve Diffie-Hellman.

n Supports standard P256 elliptic curve.

n Hardware support for symmetric algorithms.

n SHA-256 and HMAC hashes, including off-line related storage / recovery.

n AES-128: encryption / decryption, GCM support.

n support for network key management.

n Turnkey PRF / HKDF calculations based on TLS 1.2 & 1.3.

Generate temporary keys and key protocols in SRAM - Increase the encryption randomness of data transfers.

n Secure boot support.

n Complete ECDSA code signing verification, optional storage digest / signing - optional communications key features prior to secure boot.

n Information encryption / authentication to prevent board-level attacks.

n Internal high-quality FIPS 800-90a / B / C random number generator (RNG).

n two highly durable monotonic counters.

n Guaranteed a unique 72-digit serial number.

n two interface options:

High-speed single-wire interface, only one GPIO pin.

1 MHz standard I2C interface.

n 1.8V-5.5V IO, 2.0V-5.5V supply voltage.

n <150 nA Sleep current.

n 8-pad UDFN, 8-lead SOIC package


 

Nuri Dagdeviren, vice president of Microchip's Security Products Group, said: "Security is essential for today's connected applications, especially those from the hardware to the cloud, so Microchip offers proven hardware security solutions, Leading cloud providers have built an unprecedented partnership that provides all the building blocks for our customers to build security solutions that help them protect their IP, brand value and revenue streams. "

 

In addition to providing hardware security solutions, customers can join Microchip's Security Design Partner Program. These industry-leading companies, including Amazon Web Services (AWS) and Google Cloud Platform, provide complementary cloud-driven security models and infrastructures. Other partners are well versed in implementing Microchip's safety equipment and libraries. Whether designers want to secure Internet of Things (IoT) applications or add authentication for consumables such as ink cartridges or accessories, they help reduce the development time and time to market with the help of security design partners' expertise.


blob

Antony Passemard, director of product management at Google Cloud IoT, said: "Working with Microchip on the ATECC608A chipset has enabled Google IoT customers to access new, highly-secure products that are extremely comfortable to use."

 

development tools


Designers wishing to be able to quickly prototype their security solutions can use the new CryptoAuth Xplained Pro Evaluation and Development Kit (ATCryptoAuth-XPRO-B), a plug-in board that is compatible with all Microchip Xplained and XplainedPro evaluation boards.


TEL

0755-23709800
7*24-hour service hotline

Wechat

二维码Wechat
Back to top