Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Product List
CryptoAuthentication-Intro-Slide9
Cryptography can be very complex to implement well. Today’s designer needs to be an expert in many things to implement the sophisticated solutions that today’s customers demand. Because the cryptographic algorithm is integrated within the hardware of the CryptoAuthentication chip, the designer does not have to be a crypto algorithm expert. And every such solution requires careful validation to ensure that the protocol works across the desired range of configuration. Even more important, the system validation must ensure that an attacker cannot exploit any unintended side effects that might provide an avenue of attack. Using a turnkey hardware solution like CryptoAuthentication gives the designer a high level of confidence in the quality of the security without this extra work. CryptoAuthentication makes it easy for the architect and designer every step of the way. They can use the standard I²C interface to easily communicate with the CryptoAuthentication chip or, if I/O resources are constrained, use the single wire interface. Either solution can take advantage of hardware I/O blocks built into most microprocessors. Or, the communications can be implemented entirely in software using standard GPIO pins on a microprocessor. Whatever the system solution, Microchip offers complete source code libraries to help complete the project quickly. The ACES software that runs on a PC helps demonstrating the ways in which CryptoAuthentication can be used. The software provides a detailed look at the internal registers and EEPROM within the chip. Its wizard-style execution of common command sequences greatly eases exploration of the workings of the CryptoAuthentication chip. The software is available as a free download on the Microchip  website.
PTM Published on: 2012-04-04