Secure Your Investment

IP Theft is an Epidemic—But It Can Be Prevented

Did you know that international trade in counterfeit and pirated goods is expected to exceed $1.7 trillion by 2015? That's over two percent of the world's total current economic output, according to the International Anti-Counterfeiting Coalition (IACC).

Can You Afford to Not Secure Your Intellectual Property?

How much security can you afford to incorporate into your next design? In many cases, equipping an embedded system to protect its proprietary intellectual property (IP) and the data it's entrusted with represents only a small fraction of the unit's overall cost. How can you afford even this small increase and still remain competitive in a tough global technology market?

You might be hard-pressed to perform a cost/benefit analysis on what security technology provides. But imagine the real-world cost to your company if faced with one of these scenarios:

  • In 2011, hackers, exploited a security weakness and stole personal information from the private accounts of at least 77 million users of a popular gaming system, costing the company an estimated $170M in direct losses.
  • Since they were first reported in 2008, several security flaws have been discovered in pacemakers, insulin pumps and other medical devices, leading to expensive product recalls and opening up possibilities to compromise patient safety.
  • A variety of products have cloned accessories that are taking profit away from the OEMs.

Protect Against Cloning, Counterfeiting and Other Security Breaches

The Atmel® CryptoAuthentication™ family of devices provides a turnkey solution to protect your IP from cloning, counterfeiting and other security breaches. Offering the latest solutions in expert recommended cryptographic algorithms, protocols, and long key lengths, these devices prevent the most exhaustive known attacks. Since they are very easy to implement, you do not have to be a cryptographic expert to use these devices. Further, they are compatible with all microcontrollers as a companion device. Since protecting the secret key is the cornerstone of any cryptographic security paradigm, Atmel has partnered with an extensive network of distributors who are certified to provide secured programming services. As a result, you do not have to invest in expensive equipment or software to program the secrets into your device because Atmel or its partner can offer this service without gaining access to your secrets.

You can use any of the CryptoAuthentication™ devices for:

  • Secure boot
  • Trusted operation
  • Password management
  • Accessory/consumable authentication
  • Reference designs and firmware protection
  • Secure communication/data confidentiality
  • System configuration data protection
  • Secure storage

A Turnkey Solution that Protects Your Profits and Your Reputation

FeaturesKey Benefits
Latest in expert recommended cryptographic algorithms like SHA-2, AES in NIST approved CCM mode, and ECCHighly secure, NIST approved, fast
Guaranteed unique serial numberCan be used to diversify keys. If one component is compromised, all others are still secure.
High-quality random number generatorThe quality of the RNG is very important for cryptographic security.  A high-quality RN will never repeat, eliminating replay attacks.
Extended, multi-level hardware securityDesigned to defend against physically intrusive and side-channel attacks.
Easy to integrate as a cryptographic system componentCustomer does not need cryptographic expertise
Plenty of secure memory for storage of multiple keys, code segments, and biometric data like fingerprints and pictures.Enables versatile configurability. Different keys for different tasks / authentication scenarios.
Highly configurableSupports many authentication models (diversified and rolling keys). Can be used as client or host.
Many management optionsOffer secure event trackers or usage limiters to capture and preserve events useful in evaluating warranty claims or limit use within safe life of operation.
Multiple secure high-endurance monotonic countersSmall package options: 2.0mm x 3.0mm UDFN,  3-lead SOT23, 8-lead SOIC, and 3-lead contact package. Single and two-wire interfaces. 2.0 – 5.5 V power / 1.8 – 5.5 V communication.
Cost effectiveWho doesn’t want a big bang for their buck?

CryptoAuthentication™ Flagship Devices

DeviceBrief Description
ATSHA204CryptoAuthentication™ with SHA-256 based cryptographic engine optimized for storing small capacity sensitive data like keys, configuration data, and tracking information.
ATAES132CryptoAuthentication™ with AES-CCM based cryptographic engine with large enough secure storage capacity for complete confidential code snippets, and biometric data like fingerprints and pictures.
ATECC108CryptoAuthentication™ with ECC (three NIST recommended curves) and SHA-256 based cryptographic hash engine with support for ECDSA and X.509 based digital certificate management and storage.

Getting Started