What Is the CryptoAuthentication Family ?


Our CryptoAuthentication™ devices offer robust, hardware-based protection, ensuring secret keys remain secure from unauthorized access. These compact, low-power solutions integrate seamlessly with any microcontroller (MCU) or microprocessor (MPU), providing versatile security for Internet of Things (IoT) nodes across a range of applications including home automation, medical devices and wearables. Additionally, these devices safeguard the authenticity of disposable and accessory devices, preventing counterfeiting to protect your device functionality, end users and revenue.

Built with optimized hardware cryptographic accelerators, our CryptoAuthentication ICs deliver faster execution times and reduced power consumption. They feature a high-quality random number generator, EEPROM-based secure key storage and advanced defenses against physical tampering and side-channel attacks to protect your embedded systems.

Featured Products


CryptoAuthLib Library


To streamline your development process with CryptoAuthentication devices like the ATECC608, ATSHA204A, ECC204, ECC206, SHA104, SHA105, SHA106, TA010 (automotive qualified) or ATSHA206A, we offer the CryptoAuthLib library. This software support library, written in C code, is essential for integrating cryptographic services into any application or device driver. It is compatible with a range of platforms, including Arm® Cortex®-M-based microcontrollers, PIC® microcontrollers and PCs that run Windows® or embedded Linux®.

Key Attributes:

  • Easy to use: Basic Application Programming Interface (API) serves the needs of most applications
  • Powerful: Core API makes the full power of the device available for sophisticated applications and developers
  • Portable: Runs on small processors and desktop systems
  • Extensible: Designed to easily support new microcontroller platforms or protocols
  • Flexible: Includes APIs for storing, retrieving and manipulating X.509 certificates and for Transport Layer Security (TLS) integration

If you need assistance during your design and development process, visit our technical support portal to find helpful resources and get assistance from our security experts. Our approved security design partners also offer expertise with TLS stack providers, cloud platforms, certificate authority companies and the CryptoAuthLib library to help you quickly and cost effectively bring your product to market.

cryptoauthlib-block-diagram
adobestock-353435486

Accessory Authentication

Consumer, Medical

adobestock-272276287

Disposable Authentication

Consumer, Medical

Trust Platform Provisioning Service 


Use the Trust Platform Provisioning Service with four unique tiers of customer support and certified secure factories to leverage our pre-configured and pre-provisioned secure ICs with the most common security use cases.

The Trust Platform Design Suite (TPDS) tool includes secure IC configurators and use cases supported by code examples and tutorials to accelerate your development.

trustplatform-wht-319x192

CryptoAuthentication IC Products