ATSHA204A

ATSHA204A

制造商:Microchip

中文资料及数据手册

    在线购买

    产品信息

    Fast, Secure, and Cost Effective Symmetric Authentication

    The Microchip SHA-based CryptoAuthentication crypto element devices have been architected to provide flexible user-configured security to enable a wide range of authentication models. The ATSHA204A is the first device in the SHA device group. The ATECC108A and ATECC508A are supersets of the ATSHA204A and thus upward compatible. As with all CryptoAuthentication devices, the ATSHA204A is easy to design in with no crypto expertise required.
    Secure Hash Algorithm (SHA) algorithms are widely used in most cryptographic systems and remain an important component in most modern authentication protocols. These devices support the SHA-256 standard. The ATSHA204A is the most cost-effective solution in the Microchip CryptoAuthentication portfolio. It integrates the SHA-256 hash algorithm with a 4.5Kb EEPROM and provides robust hardware authentication using secure key/data storage. The tiny packaging and a single-wire interface make the device ideal for handheld electronic systems and any space-constrained embedded system.
    CryptoAuthentication devices in the SHA mode include client and host security capabilities that offload key storage and algorithm execution from the microcontroller, significantly reducing system cost and complexity. SHA based symmetric authentication is fast relative to asymmetric approaches, making the ATSHA204A a good choice with speed (and/or cost) are important considerations. CryptoAuthentication devices have full metal shields over all of the internal circuitry, so that if an attacker cuts or short circuits any trace in the shield, the product stops functioning. Additional security features include internal clocks and voltage generation, encrypted memories, tamper detection, and fully secure production test methodologies. With the ATSHA204A implementing host-side security to provide a full system solution is now easier than ever.

    The Microchip'sATSHA204A is a full turnkey security device. It includes a 4.5Kb EEPROM divided into 16 slots. This array can be used for storage of keys, miscellaneous read/write, read-only, password or secret data, and consumption tracking. Access to the various sections of memory can be restricted in a variety of ways and then the configuration locked to prevent changes.

    Access to the chip is through a standard I2C interface at speeds up to 1Mb/sec. The chip also supports a single-wire interface that can reduce the number of GPIOs required on the system processor and/or reduce the number of pins on connectors. It is compatible with most UART or serial I/O controllers. System integration is eased with a wide supply voltage range and an ultra-low sleep current of less than 100nA.

      Cost-effective Symmetric Authentication Solution

      Fast Authentication

      Easy Key Management

      Best suited for counterfeit prevention

       Crypto Element with Protected Hardware-based Key Storage

       Secure Symmetric Authentication Device Host and Client Operations

       Superior SHA-256 Hash Algorithm with Message Authentication Code (MAC)

      

    and Hash-Based Message Authentication Code (HMAC) Options  Best-in-class, 256-bit Key Length; Storage for Up to 16 Keys

      

     Guaranteed Unique 72-bit Serial Number

      

     Internal, High-quality Random Number Generator (RNG)

      

     4.5Kb EEPROM for Keys and Data

      

    512 bit OTP (One Time Programmable) Bits for Fixed Information  Multiple I/O Options̶

      

    UART-compatible High-Speed, Single-Wire Interface

      

    1MHz I2C Interface

       2.0V to 5.5V Supply Voltage Range

      

     1.8V to 5.5V Communications Voltage Range  <150nA Sleep Current

      

    Secure Download and Boot Ecosystem Control

      

    Message Security

      

    Anti-Cloning 

       

      ATSHA204A封装图

      应用案例