Secure Authentication IC: Microchip Expands Portfolio

Microchip Technology is expanding its portfolio of secure authentication IC to address the growing need for embedded security across many industries. As connected devices proliferate and the threat of counterfeiting increases, implementing trusted authentication through cryptographic solutions is becoming critical. Microchip’s latest product introductions aim to lower the barrier to entry for architects seeking to add this important security functionality in a cost-optimized way.

Secure Authentication IC

The expansion includes six new integrated circuits across Microchip’s CryptoAuthentication and CryptoAutomotive families. These ICs provide hardware-based secure key storage that meets Common Criteria and NIST standards for cryptographic processes. They support algorithms like ECDSA signatures and HMAC for data authentication and are qualified for automotive applications. By adding products like the ECC204, ECC206, SHA104, SHA105, SHA106, and TA010, Microchip can now address authentication needs in an even wider range of markets and applications.

Consumer goods, medical devices, automotive components, wireless charging systems, and data centers are just some of the industries mentioned as benefiting from embedded trust. As digital connectivity and the Internet of Things emerge in more product categories, counterfeiting represents a growing problem. Implementing cryptographic identity with a hardware root of trust helps manufacturers combat illicit cloning and ensures quality control. It also improves the user experience by verifying genuine replacements and accessories. Microchip’s new secure ICs lower the hurdles for designers across various markets to adopt authentication as a foundational security practice.

Cost Optimization Was a Core Consideration

A major focus in the new product introductions was optimizing cost, without compromising on security. Authentication enables important protections but often came with premium price tags or required costly engineering adaptations in the past. Microchip addressed this by delivering solutions suitable for large deployments down to very small production runs. Flexible key provisioning services scale to projects of any volume through Microchip’s cloud platform.

Compatibility was also key, with the ICs designed to work seamlessly alongside AVR and ARM microcontrollers without demanding platform overhauls. Streamlined integration lowers the effort needed to add cryptographic security. Combined with evaluation kits, IDE support, and documentation, Microchip aims to simplify adoption. This aligns with their mission to reduce risks for customers while lowering costs over the entire product life cycle.

The TA010 automotive IC illustrates how Microchip tailored the approach to vertical market needs. Vehicles have stringent qualification standards to ensure reliability under harsh operating conditions. The TA010 meets AEC Q-100 Grade 1 temperature ratings required for integration into automotive electronics. This readies it for advanced driver assistance systems, infotainment modules, telematics devices, and other emerging automotive applications with stricter functional safety and security mandates.

Microchip’s CryptoAuthentication Portfolio Grows Wider

Previously, Microchip only offered a handful of CryptoAuthentication devices. The expansions meaningfully deepen their lineup with complementary solutions. The ECC204 and ECC206 provide Elliptic Curve Digital Signature Algorithm-based authentication commonly required for IoT devices, industrial controls, and consumer electronics. Their one-pin and two-pin power variants accommodate different board space constraints and designs.

The SHA104, SHA105, and SHA106 ICs leverage the Secure Hash Algorithm specifically for message authentication codes. These help authenticate firmware/software updates, verify boots, and ensure data integrity for applications like healthcare sensors, industrial gateways, connected home systems, and more. Their single-pin versus dual-pin options again provide flexibility.

Overall, the combination of ECDSA and SHA offerings gives architects the versatility to select the optimal authentication scheme for their particular products and architectures. It also arms Microchip to engage with an even broader set of customers across markets now turning to embedded security solutions. Steadily expanding the portfolio in this diligent, market-driven manner cements Microchip as a leader in the space.

Streamlined Development with Trust Platform Design Suite

A cornerstone of Microchip’s authentication solution is the Trust Platform Design Suite software. It serves as a one-stop shop for securely provisioning and managing cryptographic keys. Architects can seamlessly integrate devices via an intuitive IDE plugin and web interface. The cloud-based service facilitates remote key injection for any scale of deployment from initial prototyping through mass production.

Automating traditionally tedious and error-prone manual tasks grants engineers far greater productivity. Complex key handling operations occur transparently in the background. Version control and auditing capabilities give organizations visibility and governance over their cryptographic infrastructure. Compliance with standards such as FIPS becomes straightforward as well.

When combined with the evaluation kits, documentation, and library support, the Trust Platform establishes a robust development workflow. It reduces integration complexities that may have stood in the way of adopting secure authentication in the past. With all the tools and services provided, designers gain a reliable and frictionless means to embed trust into their products.

Enabling an Expanded Set of Secure Applications

The impact of Microchip’s expanded portfolio will likely reach many markets. New industries will be able to leverage their solutions for the first time to fight counterfeiting and ensure quality control. Existing customers too will find more customized options appropriate for particular use cases and form factors. Over time, the volume may scale as embedded security disseminates to broader device categories and ecosystems.

Areas poised to integrate Microchip’s ICs include consumer goods like apparel, gym equipment, and leisure products; disposable medical devices; industrial equipment accessories; wireless power and data center infrastructure; automotive networks; military gear; and more. As digitization progresses in parallel sectors, authentication needs will continue cropping up that these ICs can readily address. By streamlining integration and offering competitive pricing, Microchip removes obstacles that may have hampered designers from implementing trusted identity before. Their solutions give companies tangible means to assert control over downstream channels and protect brands from illegitimate copies. End users also gain reassurance knowing genuine replacements and peripherals are being used as intended.

Overall, Microchip’s latest portfolio expansion strategically equips more organizations with easily deployable, cost-optimized security building blocks. It strengthens protections for industries facing counterfeit threats today while preemptively safeguarding connected systems of the future. As the digital attack surface expands dramatically, solutions like these will grow only more pivotal for embedded cyber resilience across all markets. Microchip is well-positioned to lead the charge with versatile, standards-compliant authentication ICs and services.

FAQ

Q: What applications are these ICs suitable for?

A: CryptoAuthentication and CryptoAutomotive ICs can be used in a wide variety of applications across industries like consumer electronics, medical devices, automotive, industrial IoT, wireless charging, and more. Common uses include product authentication, firmware signature verification, access control, and preventing counterfeits.

Q: How do these products provide security?

A: The ICs securely store cryptographic keys inside tamper-resistant hardware and use those keys to perform algorithms like ECDSA signatures and HMACs. This establishes a root of trust that prevents attackers from extracting keys and authenticating themselves as genuine products.

Q: Do the ICs work with any microcontroller?

A: Yes, the secure authentication ICs are designed to be compatible with any MCU or MPU, including Microchip’s AVR and ARM parts. They connect over common interfaces like I2C or SPI.

Q: How are keys provisioned and managed?

A: Cryptographic keys are provisioned and managed through Microchip’s Trust Platform Design Suite. This cloud-based service handles all key generation, injection, and storage and integrates with the ICs seamlessly through IDE plugins.

Q: What development tools are available?

A: Microchip provides evaluation kits, documentation, a CryptoAuthLib integration library, and IDE support through MPLAB X. The Trust Platform can also remotely update devices after production.

Q: How do I purchase these ICs?

A: Contact a Microchip sales representative, or authorized distributor or order through Microchip’s online store at www.microchipDIRECT.com. Engineering samples are available now with production licenses expected to ship in 2023.

Q: Are these automotive qualified?

A: The TA010 CryptoAutomotive IC meets the AEC-Q100 Grade 1 temperature rating required for integration into automotive electronics. It enables implementations for advanced driver assistance systems, infotainment, and other future vehicle applications.


About The Author

Ibrar Ayyub

I am an experienced technical writer holding a Master's degree in computer science from BZU Multan, Pakistan University. With a background spanning various industries, particularly in home automation and engineering, I have honed my skills in crafting clear and concise content. Proficient in leveraging infographics and diagrams, I strive to simplify complex concepts for readers. My strength lies in thorough research and presenting information in a structured and logical format.

Follow Us:
LinkedinTwitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.