DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

ATSHA204A データシートの表示(PDF) - Atmel Corporation

部品番号
コンポーネント説明
メーカー
ATSHA204A
Atmel
Atmel Corporation Atmel
ATSHA204A Datasheet PDF : 82 Pages
1 2 3 4 5 6 7 8 9 10 Next Last
1. Introduction
The following sections introduce the features and functions of the Atmel® ATSHA204A crypto element device.
1.1 Applications
The ATSHA204A is a member of the Atmel CryptoAuthenticationfamily of high-security hardware
authentication devices. It has a flexible command set that allows use in many applications, including the
following, among others:
Anti-counterfeiting
Validating that a removable, replaceable, or consumable Client is authentic. Example Clients could be
printer ink tanks, electronic daughter cards, medical disposables, or spare parts. The device can also be
used to validate (authenticate) a software/firmware module or memory storage element.
Protecting Firmware or Media
Validating code that is stored in flash memory at boot time to prevent unauthorized modifications (this is
also known as secure boot), encrypt downloaded media files, and uniquely encrypt code images to be
usable on a single system only.
Exchanging Session Keys
Securely and easily exchanging stream encryption keys for use by an encryption/decryption engine in the
system microprocessor to manage a confidential communications channel, an encrypted download, and
similar items.
Storing Data Securely
Storing secret keys for use by crypto accelerators in standard microprocessors. It can also be used to
store small quantities of data necessary for configuration, calibration, ePurse value, consumption data, or
other secrets. Programmable protection up through encrypted/authenticated reads and writes.
Checking User Passwords
Validating user-entered passwords without letting the expected value become known, mapping simple
passwords to complex ones, and securely exchanging password values with remote systems.
1.2 Device Features
The ATSHA204A device includes an Electrically Erasable Programmable Read-Only Memory (EEPROM) array
that can be used for key storage, miscellaneous read/write data, read-only, secret data, consumption logging,
and security configuration. Access to the various sections of memory can be restricted in a variety of ways, and
the configuration can then be locked to prevent changes. See Section 2.1, “EEPROM Organization” for details.
The ATSHA204A features a wide array of defense mechanisms specifically designed to prevent physical
attacks on the device itself or logical attacks on the data transmitted between the device and the system see
Section 3., “Security Features” for more details. Hardware restrictions on the way keys are used or generated
provide further defense against certain styles of attack.
Access to the device is made through a standard I2C interface at speeds of up to 1Mb/s. see Section 6., “I2C
Interface” for details. It is compatible with I2C interface specifications. The device also supports a Single-Wire
Interface (SWI) that can reduce the number of GPIOs required on the system processor and/or reduce the
number of pins on connectors. See Section 5., “Single-Wire Interface” for more details.
Using the Single-Wire Interface, multiple ATSHA204A devices can share the same bus, which saves processor
GPIO usage in systems with multiple Clients such as different color ink tanks or multiple spare parts, as
examples. See Section 5.4, “Sharing the Interface” and Section 8.5.13, “Pause Command” for details on how
this is implemented.
6
ATSHA204A [DATASHEET]
Atmel-8885H-CryptoAuth-ATSHA204A-Datasheet_112015

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]