AT88CK590 CryptoAuthentication USB Dongle
Created: Mar 19, 2017
No description available.
The reference design is an evaluation board for CryptoAuthentication devices which main function is to encrypt and retrieved data for security purposes. It supports modern cryptographic standards and can be integrated with any MCU. The board features three crypto-element devices that performs the encrypting and decrypting of data. The ATAES132A with hardware-based key storage, is a very fast, high-security, Serial 32Kb EEPROM that enables authentication and confidential nonvolatile data storage. While, the cost-effective ATSHA204A with hardware-based key storage provides flexible user-configured security to enable a wide range of applications. Lastly, the ATECC508A with secure hardware-based key storage supports full 256-bit ECC and is the first device to integrate ECDH (Elliptic Curve Diffie–Hellman) key agreement.
The the evaluation board is powered through a USB port connection. The AT90USB1287 serves as the server for the data processing for data encryption and decryption. The AES-128 crypto engine operates in AES-CCM mode to provide authentication, stored data encryption/decryption, and Message Authentication Codes (MACs). The data that are being encrypted can be accessed through standard SPI or I2C commands. The ATSHA204A integrates the 256-bit Secure Hash Algorithm (SHA-256) and contains 4.5Kb EEPROM for secure key and data storage. The ATSHA204A features a wide array of defense mechanisms specifically designed to prevent physical attacks on the device itself or logical attacks on the data transmitted between the device and the system. The ATECC508A with secure hardware-based key storage supports full 256-bit ECC and is the first device to integrate ECDH (Elliptic Curve Diffie–Hellman) key agreement, which makes it easy to add confidentiality (encryption/decryption) to digital systems including Internet of Things (IoT) nodes used in home automation, industrial networking, accessory and consumable authentication, medical, mobile, and other applications.
The ATSHA204A and ATECC508A can also be applied in anti-cloning, ecosystem control application. The ATAES132A can also be used in securely storing identity data like fingerprints and images. It also used in protecting sensitive firmware and authenticate consumabales, components, and network access.