We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
Item Qty
Your cart is empty.

Security is no longer an option; it’s a requirement. As your trusted provider of platform security solutions, our comprehensive portfolio addresses a variety of threat models. 

Explore Our Portfolio of Security Products


Platform Root of Trust Controllers

  • Joint Interpretation Library (JIL) Enhanced-Basic rating
  • Real-time SPI Flash monitoring
  • Device and firmware attestation
  • Commercial National Security Algorithm (CNSA) secure boot with P-384 elliptic curve
  • Physically Unclonable Function (PUF) for advanced key generation
  • Transfer of ownership features
  • Secure provisioning via Hardware Secure Modules (HSMs) 
  • Custom Soteria-G3 firmware that meets NIST 800-193 PFR guidelines 

32-bit Microprocessors (MPUs) With Integrated Security

  • Secure/measured boot root of trust
  • Secure key storage combined with hardware crypto accelerators
  • Active shielding and side channel attack protection
  • Complete software tools and provisioning to get your designs to market quickly

Microcontrollers (MCUs) With Integrated Security

  • Scalable security solutions aligned to fit application security needs such as IP protection, authentication, life cycle management, secure boot and more
  • Comprehensive ecosystem with security software, demos, tools and SoCs for rapid prototyping
  • Security assurance with certified solutions
  • Security training and education with application notes, videos, demos, reference designs, blogs, webinars and articles

Secure Authentication

  • CryptoAuthentication™ and CryptoAutomotive™ security ICs with secure key storage and hardware cryptographic accelerators
  • Hardware vulnerability assessments performed by SOGIS-accredited labs
  • Side channel attack resistance, anti-tamper, memory encryption, scrambling and key zeroization
  • Supported by the Trust Platform flow
  • Complemented with secure key provisioning service
  • Flexible use cases to support a large variety of threat models: anti-counterfeit, disposable and accessories authentication, IoT authentication, OTA, secure boot, key rotations and attestations, transfer of ownership and more

Secure FPGAs

  • Cryptographically controlled supply chain
  • Over 30 built-in tamper detectors
  • Side channel-resistant IP protection

Trust Platform

  • An onboarding methodology to set up security ICs and secure storage subsystems
    • Trust&GO: pre-provisioned
    • Trust MANAGER: keySTREAM™ SaaS-managed keys
    • TrustFLEX: pre-configured
    • TrustCUSTOM: fully customizable
  • Turnkey use case code examples
  • Supported by the Trust Platform Design Suite (TPDS) software tool
  • Your entry point into our secure provisioning service

Featured Products


CEC1712-SXX-FlipFlop2.jpg

CEC173x Real-Time Platform Root of Trust

Highly Configurable, Mixed-Signal Advanced I/O Controller

  • Immutable ROM and code rollback protection for end-to-end firmware protection
  • Ability to independently and quickly authenticate a piece of firmware before loading into an AP
  • Complete software tools and provisioning to get your designs to market quickly
  • Open Compute Project® (OCP) capable and compliant to NIST 800-193 and Automotive Grade 1
  • Root of trust for data centers, telecom/networking, industrial and automotive designs

ECC608-TMNGTLS 

Combined with the Kudelski IoT keySTREAM™ SaaS

  • ECC, SHA and AES accelerators
  • JIL secure storage subsystem
  • In-field provisioning
  • Key management with keySTREAM SaaS
  • Key updating, rotation and revocation
  • Multi-tenant infrastructure
  • Self-served Public Key Infrastructure (PKI) with IT-grade HSMs

PIC32CM LS60

Microcontroller Integrated With Secure Subsystem

  • ECC608 secure subsystem meets Joint Interpretation Library (JIL) high-rated secure key storage
  • Secure boot
  • Arm TrustZone technology
  • True Random Number Generator (TRNG)
  • Asymmetric key cryptography based on ECC and ECDSA
  • Symmetric key cryptography based on AES and GCM
  • Customizable certificate storage slots
  • DICE security standard

dsPIC33C Secure DSCs

dsPIC33A DSCs with Integrated Security

Real-Time Control, Functional Safety Compliant, Advanced Analog

  • Configurable Flash regions for IRT, One-Time Programmable (OTP) memory and custom security policies
  • Immutable secure boot
  • Secure firmware upgrade (with live update)
  • IP protection
  • Secure debug 
  • Specialized features for digital power, motor control, advanced sensing, touch and high-performance designs
  • Automotive AEC-Q100 Grade 0 qualified

Browse Our Security Resources


Need Some Help?


We are here to support you. Contact our Client Success Team to get assistance with your design.