The backdoor left by software implementation adds to the risk of exposing secret keys. The use of the ATECC508A-AWS eliminates potential backdoors, managing key and secret provisioning and accelerating the cryptographic processing significantly compared with an elliptic curve algorithm handled by software.