Security at our Core - Atmel Has You Covered - Products

Document Type


Datasheet

PDF

Software

Description

ATECC508A

ATECC508A Summary

(file size: 613KB, 14 pages, revision B, updated: 10/2015)

Secure authentication and product validation device datasheet summary. The complete document is available under NDA. For more information, please contact your local Atmel sales office.

Application Note

PDF

Software

Description

3-lead CONTACT Package Usage

3-lead CONTACT Package Usage

(file size: 515KB, 8 pages, revision A, updated: 08/2015)

Application Brief: Analyzing Strength of Security

Application Brief: Analyzing Strength of Security

(file size: 44KB, 4 pages, revision A, updated: 05/2011)

ATECC Compressed Certificate Definition

ATECC Compressed Certificate Definition

(file size: 448KB, 15 pages, revision A, updated: 11/2015)

Provides the details required to integrate an Atmel ATECC CryptoAuthentication device and the AT88CKECCSIGNER Module Kit into a third party certificate chain.

ATECC508A Node Authentication Example Using Asymmetric PKI

Atmel CryptoAuthentication Node Authentication Basic Example Solution 20160108

ATECC508A Node Authentication Example Using Asymmetric PKI

(file size: 299KB, 12 pages, revision A, updated: 10/2015)

Application note explains the all-in-one project example which demonstrates the various stages of the node authentication sequence using public key asymmetric techniques of the Atmel CryptoAuthentication devices.

CryptoAuthentication Node Basic Example Solution .zip
(file size: 15MB, released: 01/2016)

Released: 2016 January 8
SHA256: 8f9ef68ceed02be29b6472f5b4625eb53589682a24729a205c796f4d669b5cff


ATECC508A Public Key Validation

ATECC508A Public Key Validation

(file size: 338KB, 10 pages, revision A, updated: 01/2016)

Discusses the handling of public keys for which the validation function is intended and PubInfo is set to one, the operation after the Data zone is locked, and describes the command sequences in terms of the Child, Encryption, and Parent Keys.

ATSHA204A and ATECC508A Personalization Guide

ATSHA204A and ATECC508A Personalization Guide

(file size: 299KB, 9 pages, revision C, updated: 07/2015)

Authentication Counting

Authentication Counting

(file size: 392KB, 8 pages, revision A, updated: 04/2015)

CryptoAuthentication Data Zone CRC Calculation

CryptoAuthentication Data Zone CRC Calculation

(file size: 393KB, 5 pages, revision A, updated: 08/2015)

Data and OTP Zone CRC calculation for the ATSHA204A, ATECC108A, and ATECC508A devices.

CryptoAuthentication Encrypted Reads and Writes

CryptoAuthentication Encrypted Reads and Writes

(file size: 494KB, 8 pages, revision B, updated: 10/2015)

Keeps the traffic between the CryptoAuthentication device and microcontroller encrypted to prevent snooping on the bus during personalization or system operation. The encrypted read and encrypted write are configurations of the Read and Write commands and provide a mechanism for limiting access, enabling features, or updating a key value.

CryptoAuthentication SWI and I2C Interfaces Seamless Debugging Using Saleae Logic Analyzer

CryptoAuthentication SWI and I2C Interfaces Seamless Debugging Using Saleae Logic Analyzer

(file size: 1.43MB, 9 pages, revision B, updated: 08/2015)

The purpose of this document is to help the user gain a better understanding of how to use the Atmel ATSHA204A, ATECC108A, and ATECC508A devices with the Saleae Logic Analyzer.

CryptoAuthLib: Driver Support for Atmel CryptoAuthentication Devices

CryptoAuthLib SAMD21 Test Host

CryptoAuthLib: Driver Support for Atmel CryptoAuthentication Devices

(file size: 852KB, 25 pages, revision B, updated: 01/2016)

Covers how to get started and incorporate into an application, general design and use patterns, and the integration details required if CryptoAuthLib is to be ported into a hardware platform not currently supported by CryptoAuthLib.

CryptoAuthLib SAMD21 Test Host Project .zip
(file size: 14.4MB, updated: 01/2016)
An Atmel SAMD21 test host for CryptoAuthLib. This is an Atmel Studio solution for SAMD21 which incorporates CryptoAuthLib and provides a simple console interface with which to exercise ATECC508A and other CryptoAuthentication devices using the test runners that ship with CryptoAuthLib. This application tests every major feature of CryptoAuthLib and can serve as an example for using CryptoAuthLib in addition to examples such as ATECC508A Node Authentication Example Using Asymmetric PKI.

Released: 2016 January 8
SHA256: 05b840f870031157e240b2ba09f24d6eed6fabaf34893b3060849cf5ab9c0cb7


Generating Random Secrets: ATSHA204A, ATECC108A, and ATECC508A

Generating Random Secrets: ATSHA204A, ATECC108A, and ATECC508A

(file size: 791KB, 6 pages, revision B, updated: 09/2015)

Explanation on how to generate high-quality random secrets using the ATSHA204A, ATECC108A, and ATECC508A devices and Atmel Crypto Evaluation Studio (ACES).

PCB Mounting Guidelines for Surface Mount Packages

PCB Mounting Guidelines for Surface Mount Packages

(file size: 690KB, 19 pages, revision B, updated: 04/2016)

Secure Personalization with Transport Key Authentication

Secure Personalization with Transport Key Authentication

(file size: 195KB, 5 pages, revision A, updated: 11/2015)

Describes how a transport key allows for secure programming of the ATSHA204A, ATECC108A, and ATECC508A devices without the third party programming company having access to the value of the Data zone.

Article

PDF

Software

Description

Forward Secrecy Made Real Easy

Forward Secrecy Made Real Easy

(file size: 131KB, 3 pages, updated: 02/2016)

The “Three-Legged Stool” of Cryptography

The “Three-Legged Stool” of Cryptography

(file size: 162KB, 5 pages, updated: 02/2016)

More Secure, Less Costly IoT Edge Node Security Provisioning

More Secure, Less Costly IoT Edge Node Security Provisioning

(file size: 210KB, 5 pages, updated: 11/2015)

Brochures and Flyers

PDF

Software

Description

ATSHA204A, ATAES132A, ATECC108A, and ATECC508A CryptoAuthentication Family of Hardware Security Solutions

ATSHA204A, ATAES132A, ATECC108A, and ATECC508A CryptoAuthentication Family of Hardware Security Solutions

(file size: 703KB, 2 pages, revision E, updated: 11/2015)

Product Selection Guide

Product Selection Guide

(file size: 4.55 MB, 28 pages, revision 11, updated: 01/2016)

ATECC508A Flyer

ATECC508A Flyer

(file size: 446Kb, 2 pages, revision A, updated: 02/2015)

CryptoAuthentication Development and Evaluation Kit Selection Guide

CryptoAuthentication Development and Evaluation Kit Selection Guide

(file size: 839KB, 2 pages, revision B, updated: 05/2015)

White Paper

PDF

Software

Description

Attack Methods to Steal Digital Secrets

Attack Methods to Steal Digital Secrets

(file size: 279KB, 8 pages, revision A, updated: 06/2015)

Protecting People, Data and Profits with Security-Optimized Embedded Designs

Protecting People, Data and Profits with Security-Optimized Embedded Designs

(file size: 188KB, 9 pages, updated: 02/2013)

RSA vs ECC Comparison for Embedded Systems

RSA vs ECC Comparison for Embedded Systems

(file size: 358KB, 5 pages, revision A, updated: 07/2015)