Atmel Ships Ultra-Secure Crypto IC for Connected Systems

ATECC508A enables confidentiality, data integration and authentication

Atmel Corp. has introduced the next-generation CryptoAuthentication integrated circuit (IC), designed for such ultra-secure Internet of Things (IoT) applications as home automation, industrial networking, accessory and consumable authentication, medical and mobile applications.

Atmel’s new ATECC508A is the first of its kind to apply hardware-based key storage to provide the full complement of security capabilities, including confidentiality, data integrity and authentication. For the rapidly growing IoT market, the device provides these features in systems with microcontrollers (MCUs) running encryption/decryption algorithms in software. Similar to other Atmel CryptoAuthentication products, the ATECC508A uses cryptographic countermeasures and key storage that are hardware-based, providing greater security than software-based measures.

The ATECC508A features the ECDH (Elliptic Curve Diffie-Hellman) security protocol for encryptions and decryptions, as well as Elliptic Curve Digital Signature Algorithm authentication. Further, the ATECC508A is the second IC in Atmel’s CryptoAuthentication portfolio with advanced Elliptic Curve Cryptography (ECC) capabilities. 

The ATECC508A is compatible with any microcontroller or microprocessor on the market. It delivers extremely low-power consumption, and requires only a single general purpose I/O over a wide voltage range. Its small size allows it to be used in different types of applications, and prolongs battery life as well.

The ATECC508A has a flexible command set that allows use in many applications. With network or IoT-node protection, the IC authenticates node IDs to ensure message integrity and encryption. It also provides anti-counterfeiting by validating the authenticity of spare parts and ancillary accessories, and can be used to validate memory storage.

Atmel’s new CryptoAuthentication IC also protects firmware or media. Here, it validates code stored in flash memory at startup, both to ward off unauthorized modifications as well as to encrypt code images and downloaded files. 

For secure data and programmable production, microprocessor crypto accelerators can use ATECC508A’s stored  secret keys and encrypted reads and writes. The IC also authenticates user-entered passwords without letting the expected value become known. It maps memorable passwords to a random number, and securely exchanges password values with remote systems.

The ATECC508A also features methods to ward off physical attacks, and logical attacks on data. Further protection is provided by hardware restrictions on how keys are generated or used.

최신 뉴스

Sorry, your filter selection returned no results.

개인정보 보호정책이 업데이트되었습니다. 잠시 시간을 내어 변경사항을 검토하시기 바랍니다. 동의를 클릭하면 Arrow Electronics 개인정보 보호정책 및 이용 조건에 동의하는 것입니다.

당사의 웹사이트에서는 사용자의 경험 향상과 사이트 개선을 위해 사용자의 기기에 쿠키를 저장합니다. 당사에서 사용하는 쿠키 및 쿠키 비활성화 방법에 대해 자세히 알아보십시오. 쿠키와 추적 기술은 마케팅 목적으로 사용될 수 있습니다. '동의'를 클릭하면 기기에 쿠키를 배치하고 추적 기술을 사용하는 데 동의하는 것입니다. 쿠키 및 추적 기술을 해제하는 방법에 대한 자세한 내용과 지침을 알아보려면 아래의 '자세히 알아보기'를 클릭하십시오. 쿠키 및 추적 기술 수락은 사용자의 자발적 선택이지만, 웹사이트가 제대로 작동하지 않을 수 있으며 사용자와 관련이 적은 광고가 표시될 수 있습니다. Arrow는 사용자의 개인정보를 존중합니다. 여기에서 당사의 개인정보 보호정책을 읽을 수 있습니다.