Get Started

We'll tell you all you need to know to start evaluating and working with this product.

An easy-to-use USB dongle explores the capability of the ATSHA204(A), ATAES132, and ATECC108


» Learn more
Incorporate security into your next design » Learn more

Control your design investment with Atmel security products


» Learn More
CryptoAuthentication

Cost-effective, optimized hardware security solutions

The Atmel® CryptoAuthentication™ family offers product designers an extremely cost-effective hardware authentication capability in a wide variety of space-conscious packages. CryptoAuthentication ICs securely validate a wide variety of physical or logical elements in virtually any microprocessor-based system. Atmel offers both symmetric- and asymmetric-key algorithm-based devices. By implementing a CryptoAuthentication IC into your design, you can take advantage of world-class protection that is built with hardware security fortifications like full active metal shields, multiple tamper detection schemes, internal encryption, and many other features designed to thwart the most determined attacks.

The device family supports the Secure Hash Algorithm (SHA-2), the Advance Encryption Standard (AES), and the Elliptic Curve Cryptography (ECC) cryptographic algorithms. SHA-2 offers fast operation at the lowest cost point. AES provides authentication via the CCM mode and includes encryption capability for the memory embedded in the chips. ECC brings the advantage of asymmetric cryptography requiring no secret storage in the host, but without the performance and code complexity of implementations in software. Each device implements both host- and client-side commands.

Every Atmel CryptoAuthentication device contains a pre-programmed serial number that is guaranteed unique. The devices also include generous secure storage that is segmented into zones which you can individually configure to meet a wide variety of applications. Each device features a high-quality hardware random number generator ideal for authentication or any other system purpose. The ICs support many common serial interfaces and come in a variety of packages. Atmel CryptoAuthentication devices find use in consumer, communications, computing, and industrial, medical and scientific applications.

Atmel CryptoAuthentication devices find use in consumer, communications, computing, and industrial, medical and scientific applications.

Key Features

  • Cost-effective hardware authentication capability
  • Flexible use model for many applications
  • Easy turnkey integration
  • Secure system identification for networking, warranty, communication
  • Small 8 lead package
  • Hardware Security technology
  • High Quality Random Number Generators (RNG)
  • Active Shield
  • Tamper monitors

Atmel CryptoAuthentication™ Devices

Device Family Summary Benefit Applications Technologies Key Parameters
Fast authentication

Easy key management

Clone prevention

Home and Building Automation

Controlled access

Industrial control

Mobile accessories

Lighting

White Goods
HMAC

Limited use keys for consumables
1MHz I2C Interface

Single wire interface

256 bit key size
Authentication plus Encryption in a single protocol
Medical data

Industrial control

Secure telecom

Controlled Access
AES-CCM

High endurance counters
1MHz I2C Interface

SPI interface
Authentication without the requirement for secure storage in the host

No requirement for high speed computing in client devices
Industrial networking

Industrial control

Secure telecom

Home and Building Automation

Mobile accessories

Metering

Lighting
Temperature sensor

ECDSA

Limited use keys for consumables
1MHz I2C Interface

Single wire interface