We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
0
$0.00
Item Qty
Your cart is empty.

Live Chat

Need Help?

Privacy Policy

Choosing the Right Secure Key Storage Option for Your Application


Each market has distinct requirements and regulations that define device specifications. The table below highlights the appropriate authentication IC for each market and includes relevant literature for the markets and products marked with green checkmarks.

Product Families


CryptoAuthentication™ ICs

IoT, Medical, Consumer, Factory Automation, Accessory, Disosable

The CryptoAuthentication family secures cryptographic assets for IoT, consumer, medical, factory automation, accessory and disposable applications. It protects against counterfeiting and enables secure cloud connections and device ecosystems.

CryptoAutomotive™ ICs

Automotive, EV Charging

Use our CryptoAutomotive security ICs for implementing in-vehicle network security in existing and future automotive and EV charging designs.

TPM Products

Use our enterprise-grade Trusted Platform Modules (TPMs) in server and computing applications.

Trust Platform Provisioning Service 


With four unique tiers of customer support and certified secure factories, our Trust Platform Provisioning Service allows you to leverage our pre-configured and pre-provisioned CryptoAuthentication and CryptoAutomotive devices with the most common security use cases.

With code examples and tutorials for accelerated development, the Trust Platform Design Suite (TPDS) tool contains secure IC configurators and use cases to help you accelerate your development.

Implement Trust in Any System With Our Scalable Embedded Security Solutions


In a trusted embedded system, the root of trust must be safeguarded within a secure environment. This serves as the essential foundation for securing an application by utilizing key-based authentication to validate system transactions. If a key is spoofed, unauthorized or malicious users can potentially take control of your system's transactions. Therefore, establishing trust from the outset of your embedded system design is crucial to protect authentication keys and prevent such vulnerabilities.

To avoid creating backdoors that could expose keys, both the cryptographic functions and the keys used in authentication must be stored in a container that is secure by design. Our secure elements are configurable companion devices that can integrate seamlessly with any microcontroller (MCU) or microprocessor (MPU). They offer hardware-based crypto-accelerators, secure key storage and protection against tampering and side-channel attacks, making it easy to embed trust into your system. With flexible, advanced features, cost-effective architectures and robust hardware defense mechanisms, our security devices provide a reliable solution for integrating trust at scale and by design.

In addition to secure containers for authentication keys and credentials, we offer secure provisioning services for deployments of all sizes. Our Trust Platform for the CryptoAuthentication and CryptoAutomotive families provides a four-tiered service that offers pre-provisioned, pre-configured or fully customizable secure elements, allowing you to implement secure authentication easily across projects of varying scales. Our secure manufacturing facilities ensure keys are provisioned into devices safely, protecting them from exposure during production, deployment and the entire lifecycle of the device. Our latest provisioning tier, TrustMANAGER, enables in-field provisioning to further eliminate the threat of key exposure. 

Security ICs


Want to Learn More About Security and Other Hardware-Based Options?


Because there are many options for adding security to embedded designs, we offer a variety of flexible and complementary solutions in addition to our portfolio of secure elements, such as crypto-enabled microcontrollers and microprocessors. Use the link below to learn more about security and find the best type of protection for your design.