Our flexible CryptoAuthentication ICs can protect the symmetric keys in your host system or in the disposable itself. The SHA105 can be used on the host while the SHA104 or SHA106 can be used to protect the symmetric key on the disposable when it is paired with the SHA105 on the host system. The ATSHA204 offers more slots, allowing you to implement more use cases on the host system and disposable.
Our cost-effective ECC204 or more-advanced ATECC608 devices enable you to implement Public Key Infrastructure (PKI) for asymmetric authentication with private/public key pairs and certificates. If you would like to eliminate the PCB in your disposable, consider using our three-pin and two-pin (ECC206) authentication ICs for Elliptical Curve Cryptographic (ECC). Depending on the threat model you are using, the public key can be stored in an immutable memory zone of the host system’s microcontroller (MCU) or in the ATECC608.
If your product requires cloud connectivity and support for additional security use cases, consider using the ATECC608 for your host system. This device has plenty of cryptographic capabilities to protect the private keys for Transport Layer Security (TLS) and Bluetooth® Low Energy (LE) sessions. It can also support secure boot, secure firmware upgrades and other symmetric or asymmetric host authentication functions to optimize the cost of your security architecture.
Use the Trust Platform Provisioning Service with four unique tiers of customer support and certified secure factories to leverage our pre-configured and pre-provisioned secure ICs with the most common security use cases.
The Trust Platform Design Suite (TPDS) tool includes secure IC configurators and use cases supported by code examples and tutorials to accelerate your development.
We offer a comprehensive portfolio of memory devices that can provide product identification without security capabilities.