Get Started

We'll tell you all you need to know to start evaluating and working with this product.

AT86RF233SMAD-EK

Hardware-based Security Solutions for Every System Design


» Learn More

An easy-to-use USB dongle explores the capability of the ATSHA204(A), ATAES132, and ATECC108


» Learn more

Authentication Engines with Ultra-secure Hardware Key Storage

Why use CryptoAuthentication?
Keys are the "root of trust" in any system, and differentiate your system from all others. Existing systems store keys in system memory which is subject to software bugs that can expose keys. So, software alone cannot protect keys. Specialized hardware key storage is the only solution, because you cannot attack what you cannot see.

CryptoAuthentication Device Family
Atmel offers the industry's widest selection of hardware authentication and encryption devices. The portfolio is currently comprised of three parts with several others under development. Our CryptoAuthentication devices provide confirmation that hardware and software products are real, which is what authentication is all about. The devices are extremely cost-effective and come in exceptionally small packages.

Benefits

  • Supports modern standards
  • 3 generations of proven capabilities
  • Ultra-strong hardware based key storage

CryptoAuthentication™ Uses
All of the devices ensure that a product, consumables it uses, firmware it runs, accessories that support it and, the network nodes it connects to are not cloned, counterfeited, or tampered with; and they can be used in many different ways. Authentication helps maintain an OEM’s revenue flow by ensuring that only legitimate products can work in the host system, and that devices are not used beyond their expiration.

  • Anti-Counterfeiting — Validates that a removable, replaceable, or consumable client is authentic. Examples of clients could be system accessories, electronic daughter cards, or other spare parts. It can also be used to validate a software/firmware module or memory storage element.
  • Protecting Firmware or Media — Validates code stored in flash memory at boot to prevent unauthorized modifications, encrypt downloaded program files as a common broadcast, or uniquely encrypt code images to be usable on a single system only.
  • Storing Secure Data — Store secret keys for use by crypto accelerators in standard microprocessors. The ATECC108A can also be used to store small quantities of data necessary for configuration, calibration, ePurse value, consumption data, or other secrets. Programmable protection is available using encrypted/authenticated reads and writes.
  • Checking User Passwords — Validates user-entered passwords without letting the expected value become known, maps memorable passwords to a random number, and securely exchanges password values with remote systems.

CryptoAuthentication Makes it Real Easy
Even though cryptography is mathematically complex and highly sophisticated with many standards, algorithms, processes, definitions, and methodologies; those things do not matter because Atmel does the crypto engineering, and presents it to the user in cost effective, turnkey hardware. So, there is no need to be a crypto expert.

The speed, code space, pin count, and architecture of the microprocessor are not a concern. CryptoAuthentication devices work with any processor, need only a single GPIO, are very low power, and operate over a wide voltage range.

Key Features

  • Cost-effective symmetric and asymmetric authentication
  • Easy to design in
  • Ultra-secure hardware key storage
  • Small packages
  • High Quality Random Number Generators (RNG)
  • Active Shield
  • Common Serial Interfaces
  • Active Shield
  • Tamper Monitors
  • Secure Hash Algorithm (SHA-2), Advance Encryption Standard (AES), and Elliptic Curve Cryptography (ECC) cryptographic algorithms

Devices

Device Family Summary Benefit Applications Technologies Key Parameters
Fast authentication

Easy key management

Clone prevention

Home and Building Automation

Controlled access

Industrial control

Mobile accessories

Lighting

White Goods
HMAC

Limited use keys for consumables
1MHz I2C Interface

Single wire interface

256 bit key size
Authentication plus Encryption in a single protocol
Medical data

Industrial control

Secure telecom

Controlled Access
AES-CCM

High endurance counters
1MHz I2C Interface

SPI interface
Authentication without the requirement for secure storage in the host

No requirement for high speed computing in client devices
Industrial networking

Industrial control

Secure telecom

Home and Building Automation

Mobile accessories

Metering

Lighting
Temperature sensor

ECDSA

Limited use keys for consumables
1MHz I2C Interface

Single wire interface