Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Product List
CryptoAuthOverview-Slide9
Cost effective, optimized performance has been designed in to every CryptoAuthentication™ device from inception. As noted, the turnkey, tested hardware approach is not subject to software bugs, which are common to software-in-the-host approaches. Users do not have to be cryptography experts to design-in a high level of security by using the MIcrochip CryptoAuthentication™ devices. The algorithms, testing, and protection are already built in. Furthermore, the learning curve is shortened greatly by a full evaluation and development suite of hardware and software. Microchip supports the latest cryptographic algorithms, which Microchip has now proven through three generations. In addition to robust, tested cryptography, the devices also include a series of hardware countermeasures to guard against attack. The devices include a serpentine metal shield over the entire device and there are no test or probe points for hackers to gain access to the operations of the devices. Furthermore, the devices present tamper detection and defend against timing attacks.
PTM Published on: 2014-03-13