{"id":2704,"date":"2017-11-21T08:15:46","date_gmt":"2017-11-21T08:15:46","guid":{"rendered":"https:\/\/engineernewsnetwork.com\/blog\/?p=2704"},"modified":"2017-11-20T17:53:14","modified_gmt":"2017-11-20T17:53:14","slug":"protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/","title":{"rendered":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device"},"content":{"rendered":"<span class=\"highlight highlight-blue\"><a href=\"http:\/\/www.microchip.com\/design-centers\/security-ics\/cryptoauthentication\/overview\" target=\"_blank\" rel=\"noopener\">Microchip<\/a><\/span> announces the ATECC608A CryptoAuthentication device, a secure element that allows developers to add hardware-based security to their designs, and a Security Design Partner Programme for connecting developers with third-party partners that can enhance and expedite secure designs.<\/p>\n<p>The combination of proven hardware security solutions and an unprecedented level of partnership helps to protect against security threats ranging from remote cyber-attacks to the creation of counterfeit products.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nThese threats are wide-spread and affect all industries and can translate into substantial losses in recovery costs, service revenue and perhaps, most significantly, in brand equity.<\/p>\n<p>Implementing robust security into new and existing designs to protect Intellectual Property (IP) and enable trusted authentication of connected devices is critical.<\/p>\n<p>The foundation of secured communication is the ability to create, protect and authenticate a device\u2019s unique and trusted identity.<\/p>\n<p>By keeping a device\u2019s private keys isolated from the system in a secured area, coupled with its industry-leading cryptography practices, the ATECC608A provides a high level of security that can be used in nearly any type of design. Primary features of the ATECC608A include:<\/p>\n<p>* Best-in-class key generation: The Federal Information Processing Standard (FIPS)-compliant Random Number Generator (RNG) generates unique keys compliant with the latest requirements from the National Institute of Standards and Technology (NIST), providing an easier path to a whole-system FIPS certification.<\/p>\n<p>* Boot validation capabilities for small systems: New commands facilitate the signature validation and digest computation of the host microcontroller (MCU) firmware for systems with small MCUs, such as an ARM Cortex-M0+, as well as for more robust embedded systems.<\/p>\n<p>* Trusted authentication for LoRa nodes: The AES-128 engine also makes security deployments for LoRa infrastructures possible by enabling authentication of trusted nodes within a network.<\/p>\n<p>* Fast cryptography processing: The hardware-based integrated Elliptical Curve Cryptography (ECC) algorithms create smaller keys and establish a certificate-based root of trust more quickly and securely than other implementation approaches that rely on legacy methods.<\/p>\n<p>* Tamper-resistant protections: Anti-tampering techniques protect keys from physical attacks and attempted intrusions after deployment. These techniques allow the system to preserve a secured and trusted identity.<br \/>\nTrusted in-manufacturing provisioning: Companies can use <span class=\"highlight highlight-blue\"><a href=\"https:\/\/engineernewsnetwork.com\/blog\/single-wire-serial-eeprom-from-microchip-enables-remote-identification\/\" target=\"_blank\" rel=\"noopener\">Microchip<\/a><\/span>\u2019s secured manufacturing facilities to safely provision their keys and certificates, eliminating the risk of exposure during manufacturing.<\/p>\n<p>In addition to providing hardware security solutions, customers have access to <span class=\"highlight highlight-blue\"><a href=\"https:\/\/engineernewsnetwork.com\/blog\/improve-response-time-to-critical-system-events-on-can-networks\/\" target=\"_blank\" rel=\"noopener\">Microchip<\/a><\/span>\u2019s Security Design Partner Programme. These companies, including Amazon Web Services (AWS) and Google Cloud Platform, provide complementary cloud-driven security models and infrastructure.<\/p>\n<p>Other partners are well-versed in implementing Microchip\u2019s security devices and libraries.<\/p>\n<p>Whether designers are looking to secure an Internet of Things (IoT) application or add authentication capabilities for consumables, such as cartridges, or accessories, the expertise of the Security Design Partners can reduce both development cost and time to market.<\/p>\n<p>For rapid prototyping of secure solutions designers can use the new CryptoAuth Xplained Pro evaluation and development kit in addition to the ATCryptoAuth-XPRO-B add-on board.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microchip announces the ATECC608A CryptoAuthentication device, a secure element that allows developers to add hardware-based security to their designs, and a Security Design Partner Programme for connecting developers with third-party partners that can enhance and expedite secure designs. The combination of proven hardware security solutions and an unprecedented level of partnership helps to protect against &hellip;<\/p>\n","protected":false},"author":1,"featured_media":2705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[104],"tags":[1161,169],"class_list":["post-2704","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-electronics","tag-atecc608a-cryptoauthentication-device","tag-microchip"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Microchip announces the ATECC608A CryptoAuthentication device, a secure element that allows developers to add hardware-based security to their designs, and a Security Design Partner Programme for connecting developers with third-party partners that can enhance and expedite secure designs. The combination of proven hardware security solutions and an unprecedented level of partnership helps to protect against &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-21T08:15:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device\",\"datePublished\":\"2017-11-21T08:15:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\"},\"wordCount\":507,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg\",\"keywords\":[\"ATECC608A CryptoAuthentication device\",\"Microchip\"],\"articleSection\":[\"Electronics\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\",\"name\":\"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg\",\"datePublished\":\"2017-11-21T08:15:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg\",\"contentUrl\":\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg\",\"width\":2100,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.engineernewsnetwork.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#website\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/","og_locale":"en_GB","og_type":"article","og_title":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network","og_description":"Microchip announces the ATECC608A CryptoAuthentication device, a secure element that allows developers to add hardware-based security to their designs, and a Security Design Partner Programme for connecting developers with third-party partners that can enhance and expedite secure designs. The combination of proven hardware security solutions and an unprecedented level of partnership helps to protect against &hellip;","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/","og_site_name":"Engineer News Network","article_published_time":"2017-11-21T08:15:46+00:00","og_image":[{"width":2100,"height":1500,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device","datePublished":"2017-11-21T08:15:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/"},"wordCount":507,"commentCount":0,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg","keywords":["ATECC608A CryptoAuthentication device","Microchip"],"articleSection":["Electronics"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/","name":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg","datePublished":"2017-11-21T08:15:46+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2017\/11\/MC1407-ATECC608A-application-image-hi.jpg","width":2100,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/protect-ip-and-deploy-secured-connected-systems-with-microchips-cryptoauthentication-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect IP and deploy secured connected systems with Microchip\u2019s CryptoAuthentication device"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/2704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=2704"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/2704\/revisions"}],"predecessor-version":[{"id":2706,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/2704\/revisions\/2706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/2705"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=2704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=2704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=2704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}