- Evaluation Kits
- Starter Kits
- Development Kits
- Reference Designs
- Add-ons and Accessories
- Zigbit Wireless Modules
- Corporate Releases
- Product Releases
- Technical News Briefs
- Speakers Bureau
- Atmel in the News
- Embedded Design Blog
- Events and Webcasts
- Press Releases
- Stock Information
- SEC Filings
- Corporate Governance
- Executive Profiles
- Board of Directors
- Quality Inquiry
- Quality Handbook
- Green Packaging
- Package Material
- Environmental Information
- Quality and Environment Certificates
- RMA and FA Information
- Reliability Information
- Obsolescence Information
- FAQ Response Summary
Why Implement Hardware Security?
Silicon-Based Security Is Superior to Software Solutions
What makes hardware security more secure? Confidential data or secrets are vulnerable to attack when stored in standard memories, disks or other software repositories. Atmel® security ICs provide a number of sophisticated design features aimed at keeping key information and core secrets safe from hackers and thieves — on all types of processor-driven systems. This hardware-based security also offers protection at partner and subcontractor sites using secure personalization capabilities.
Defend Intangible Assets
The loss of valuable intellectual property (IP) or trade secrets can have a direct negative impact on any company's bottom line. The best defense against IP theft and misuse of intangible property is to block access to the information that constitutes the asset. Atmel CryptoAuthentication™ technology keeps the IP secure even when it’s in the hands of OEM manufacturers or subcontractors. Each device is designed to permit secure personalization, so third parties can build devices containing an OEM secret without gaining access to that secret. The SHA-256 hash algorithm with a 256-bit key length prevents exhaustive attacks.
Harden the Targets
All parts of an organization’s security umbrella should be “hardened” or shielded from attack, including encryption keys, verification codes and firmware. Atmel hardware-based security can accomplish that goal in a small space, simply and cost-effectively. There is virtually no way to download secret information that has been locked inside a device. Atmel CryptoAuthentication devices implement the host security algorithm in hardware and securely store and manage the host secrets, strengthening system-level security.
Implement Security with Ease
With Atmel CryptoAuthentication ICs, you get a turnkey solution to meet your security needs. Our CryptoAuthentication devices are the perfect companion with all Atmel microcontrollers (MCUs). What’s more, with our personalization service, you don’t need to be cryptography experts or invest in expensive equipment or software to program the secrets into your chip.
To make deployment as seamless as possible, Atmel has several options available for device personalization. These include:
- Using one of our socketed development boards along with our software tool suite for very low volumes
- Using our standalone secure personalization kit for low volumes
- Purchasing an Atmel-approved third-party programming tool for all volumes
- Using certified programming services through our distribution partners for all volume levels
- Using Atmel’s value-added secure personalization service for high volumes
Protect Revenue Streams
Authentication devices prevent cloning by competitors. Onboard security ICs can be used to identify legitimate removable components such as battery packs, medical disposables, ink cartridges and filters that aren’t equipped with their own processors. Multiple physical security features prevent unauthorized disclosure of the secret key stored within the device.
Comply with Regulations
Security has been mandated in a number of industries such as healthcare and wireless communication, with rules that organizations must adhere to when they implement information systems. Security ICs can help organizations comply with these regulations, particularly with regard to portable and externally operated devices that are particularly difficult to secure.
Safeguard a Valuable Reputation
A good reputation in the marketplace can easily be put at risk by a security breach as simple as an unauthorized software download. In financial terms, damage to a firm's reputation can result in lost revenue or destruction of shareholder value. Building iron-clad security into a product or service helps safeguard the company’s good name, protecting both the company and the customer. It can also be part of a comprehensive risk management program that can help ensure the viability of the enterprise.
Where environments dictate close-proximity secure wireless communications the Atmel® CryptoRF® Transponder, Atmel CryptoRF Reader, and Atmel CryptoCompanion™ offer a full RFID secure authentication solution for embedded and non-embedded applications. CryptoRF is ideally suited to meet a variety of security applications such as product authentication, contactless payment, patient safety, anti-cloning of consumables, loyalty and patron management. CryptoRF devices are great for proximity applications where hardware security is desired or when environmental factors such as dirt, moisture, chemicals, etc., exist.
Below is a selection of Atmel application notes and other documents for your reference.