SHOP FOR
http://base-store.storehippo.com/
# 2514/U, 7th 'A' Main Road, Opp. to BBMP Swimming Pool, Hampinagar, Vijayanagar 2nd Stage. 560104 Bangalore IN
Tenettech E-Store
# 2514/U, 7th 'A' Main Road, Opp. to BBMP Swimming Pool, Hampinagar, Vijayanagar 2nd Stage. Bangalore, IN
+918023404924 https://cdn1.storehippo.com/s/59c9e4669bd3e7c70c5f5e6c/ms.settings/5256837ccc4abf1d39000001/webp/59dafe26aef6e1d20402c4c3-480x480.png" info@tenettech.com
5ff804c1c316ab5ec6452022 IC AUTHENTICATION CHIP https://cdn1.storehippo.com/s/59c9e4669bd3e7c70c5f5e6c/5ff804c3c316ab5ec6452041/webp/8-udfn.webp

Description:

Authentication Chip 8-UDFN (2x3)

Features:

  • Cryptographic Co-Processor with Secure Hardware-Based Key Storage:
    – Protected storage for up to 16 keys, certificates or data
  • Hardware Support for Asymmetric Sign, Verify, Key Agreement:
    – ECDSA: FIPS186-3 Elliptic Curve Digital Signature
    – ECDH: FIPS SP800-56A Elliptic Curve Diffie-Hellman
    – NIST Standard P256 Elliptic Curve Support
  • Hardware Support for Symmetric Algorithms:
    – SHA-256 & HMAC Hash including off-chip context save/restore
    – AES-128: Encrypt/Decrypt, Galois Field Multiply for GCM
  •  Networking Key Management Support:
    – Turnkey PRF/HKDF calculation for TLS 1.2 & 1.3
    – Ephemeral key generation and key agreement in SRAM
    – Small message encryption with keys entirely protected

Datasheets: IC AUTHENTICATION CHIPPdf

CS-150-ATECC608B-MAHCZ-SCT-ND
in stockINR 79
Microchip Technology
1 1
XYZ Blog title
ABC Blog title here
IC AUTHENTICATION CHIP

Description of product

Description:

Authentication Chip 8-UDFN (2x3)

Features:

  • Cryptographic Co-Processor with Secure Hardware-Based Key Storage:
    – Protected storage for up to 16 keys, certificates or data
  • Hardware Support for Asymmetric Sign, Verify, Key Agreement:
    – ECDSA: FIPS186-3 Elliptic Curve Digital Signature
    – ECDH: FIPS SP800-56A Elliptic Curve Diffie-Hellman
    – NIST Standard P256 Elliptic Curve Support
  • Hardware Support for Symmetric Algorithms:
    – SHA-256 & HMAC Hash including off-chip context save/restore
    – AES-128: Encrypt/Decrypt, Galois Field Multiply for GCM
  •  Networking Key Management Support:
    – Turnkey PRF/HKDF calculation for TLS 1.2 & 1.3
    – Ephemeral key generation and key agreement in SRAM
    – Small message encryption with keys entirely protected

Datasheets: IC AUTHENTICATION CHIPPdf