We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
0
$0.00
Item Qty
Your cart is empty.

Secure Authentication for Accessory Ecosystems


Implement a controlled accessory ecosystem strategy, a third-party certification program or accessory counterfeit prevention with our CryptoAuthentication™ and CryptoAutomotive™ ICs. Our devices provide Common Criteria Joint Interpretation Library (JIL) "high” rated symmetric or asymmetric secure and robust key storage.

Accessory devices most frequently connect locally to a broader device ecosystem, providing complementary functionality to enhance the user experience. They are typically designed to be reusable, with interchangeable users, ensuring flexibility and compatibility across different systems.

Featured Products


Authentication Types


Symmetric Authentication

If your threat model steers you to implement symmetric authentication, our SHA105 host authentication IC will protect the key in the host system and SHA104 will protect the key in the accessory. To implement symmetric authentication in automotive applications such as card authentication or Electric Vehicle (EV) battery module authentication, our Trust Anchor TA100 CryptoAutomotive IC will provide secure host key storage in the main Battery Management System (BMS) and the TA010 will authenticate the battery modules.

Asymmetric Authentication

If you need to use asymmetric authentication for your security strategy, the ECC204 and ATECC608 CryptoAuthentication ICs will protect your public/private key pair, certificates and even symmetric keys. For automotive applications, the feature-rich TA100 and the more cost-effective TA010 can address your security requirements.

Adding Cloud Connectivity 


When cloud connectivity and additional security use cases are required, consider using the ATECC608 for your host system or the TA100 for automotive applications. These secure authentication ICs will protect the private keys for Transport Layer Security (TLS) and Bluetooth® Low Energy (LE) sessions as well as the public keys for secure boot and secure firmware upgrades. 

Trust Platform Provisioning Service 


Use the Trust Platform Provisioning Service with four unique tiers of customer support and certified secure factories to leverage our pre-configured and pre-provisioned secure ICs with the most common security use cases.

The Trust Platform Design Suite (TPDS) tool includes secure IC configurators and use cases supported by code examples and tutorials to accelerate your development.

Compatible Products


Interested in Identification?


We offer a comprehensive portfolio of memory devices that can provide product identification without security capabilities.