Protecting embedded systems with robust security is essential in Internet of Things (IoT), automotive, medical, consumer, wireless, industrial and other connected designs. Security standards are available and constantly evolving to reinforce requirements of IoT applications. Many automotive Original Equipment Manufacturers (OEMs) are including security in their design specifications to protect Electronic Control Units (ECUs) in connected vehicles from attacks.
No matter what market or application they address, these security specifications all contain similar requirements:
Watch this video to learn how our dsPIC33C DSCs work together with security ICs to implement robust system-level security.
Our high-performance dsPIC33C Digital Signal Controllers (DSCs), combined with our ATECC608 CryptoAuthentication™ and TrustAnchor100 (TA100) CryptoAutomotive™ security ICs, provide robust security for your designs.
Our dsPIC33C DSCs deliver high performance, low power consumption and an application-specific feature set for low-power security, sensor interfacing, real-time control, functional safety, digital power conversion, Qi® wireless charger and motor control applications.
The bootloader in MPLAB® Code Configurator (MCC)/MPLAB Harmony leverages the hardware- security features of the dsPIC33A and dsPIC33C to implement secure boot and secure firmware upgrades. This library can also be used for applications using the dsPIC33 DSCs with ATECC608 and TA100.
Designed to work with the ATECC608 CryptoAuthentication and TA100 CryptoAutomotive devices, this software support library is available with MCC as a component of any application or device driver that requires crypto services from a crypto coprocessor. It works seamlessly with the dsPIC33C DSCs.
The bootloader in MPLAB® Code Configurator (MCC)/MPLAB Harmony leverages the hardware- security features of the dsPIC33A and dsPIC33C to implement secure boot and secure firmware upgrades. This library can also be used for applications using the dsPIC33 DSCs with ATECC608 and TA100.
Designed to work with the ATECC608 CryptoAuthentication and TA100 CryptoAutomotive devices, this software support library is available with MCC as a component of any application or device driver that requires crypto services from a crypto coprocessor. It works seamlessly with the dsPIC33C DSCs.
Visit our Internet of Things area to learn about reference applications for the dsPIC33C DSCs that use the CryptoAuthLib library to showcase Amazon Web Service (AWS) and Microsoft® Azure® Cloud connectivity. These reference applications, which are based on our PIC-IoT series of development boards, demonstrate secure node authentication and secure communication.
Avoid the high risks of exposure to your keys and reduce the costs of mass production by leveraging our secure key provisioning service. Our Trust platform provisioning service prevents your credentials from being exposed at any time during product development and production, while also eliminating the need for extensive knowledge of and the necessary secure networks to handle cryptographic keys securely.
With its minimalistic approach, the wolfBoot bootloader enables designs with low footprints and high performance. It is a part of wolfSSL's suite of security products, which also includes the wolfCrypt advanced crypto engine.
This demo application utilizes a dsPIC33C MPT secure DSC or dsPIC33C DSC in conjunction with the TA100 CryptoAutomotive™ security IC to implement the Security Protocol and Data Model (SPDM) specification. This enables a digital power solution that satisfies the security requirements for an OCP-compliant power supply.
Join our security experts and partners to learn about the latest trends and new developments for safeguarding your designs.
Available for free and on demand from Microchip University, our dsPIC Bootloaders Using MCC: Device Side offers a live demonstration of implementing a bootloader, secure boot and secure firmware upgrades.
Focuses on developing a secure 16-bit bootloader and a generic bootloader with dsPIC33 DSCs
Fundamentals of symmetric and asymmetric cryptography and how to apply each in real-world situations
In the event of the discovery of a vulnerability in any of our products, tools, software or firmware solutions, our Product Security Incident Response Team (PSIRT) is set up to ensure that the vulnerability is mitigated and communicated responsibly. Use the link below to follow our coordinated disclosure process to report your findings.