Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Product List
CryptoAuthentication-Intro-Slide7
Security solutions are commonly implemented using software in a microprocessor, and these solutions can be very cost effective. In particular, when the microprocessor includes a cryptographic accelerator, it can also offer very good performance. But it is often hard to determine how much protection these solutions provide for the storage of secret keys. If an attacker can find out part or all of the secret, then he can usually unwind the rest of the security protocol. The CryptoAuthentication chip complements the microcontroller by providing highly secure storage for authentication values, encryption keys, passwords and related secrets. By implementing both the cryptographic algorithm and a flexible protocol in hardware, the chip eliminates the need for development and validation of cryptographic firmware – reducing time to market. The Trusted Platform Module (TPM) from Microchip offers a rich set of cryptographic primitives that can be used in a wide variety of applications. It meets the Trusted Computing Group’s standard for hardware security in personal computers and supports the widely used RSA public key algorithm. Particularly for any Internet-connected device, the TPM offers unparalleled compatibility.
PTM Published on: 2012-04-04