Enrgtech

Deliver to

United Kingdom

Categories

Brands

Part Numbers

Top Products

0

We hope you are enjoying our new upgraded website. Bringing you faster search results and a greater variety of products. Please click here to share your comments/experience.

Products Found: 30

Showing Results For: Security & Authentication Chips

Security & Authentication Chips


FILTERS
Filters
Enrgtech #
Manufacturer Part No
Description
Availability
Rating
Rohs Verified
The Infineon SLS32AIA series OPTIGA™ Trust X reduces integration effort and is easy to use making it ideal for customers who lack security expertise but nonetheless need fast time-to-market. This premium security solution offers high performance and low power consumption. It supports non-rich operating systems and comes in compact packages. It enables new features and business models which help you to differentiate your offering and stay ahead of the competition. High-end security controller Turnkey solution Mutual authentication using ECDSA DTLS client IETF standard RFC 6347 Secure communication using DTLS Compliant with the usb type-C™ authentication standard I2C interface Up to 10 kB user memory
Check Stock & Lead Times Packaging Options
Rohs Verified
Fast, Secure, and Cost Effective Symmetric Authentication. The Microchip SHA-based CryptoAuthentication crypto element devices have been architected to provide flexible user-configured security to enable a wide range of authentication models. The ATSHA204A is the first device in the SHA device group. The ATECC108A and ATECC508A are supersets of the ATSHA204A and thus upward compatible. As with all CryptoAuthentication devices, the ATSHA204A is easy to design in with no crypto expertise required. Secure Hash Algorithm (SHA) algorithms are widely used in most cryptographic systems and remain an important component in most modern authentication protocols. These devices support the SHA-256 standard. Symmetric Authentication Solution Fast Authentication Easy Key Management Best suited for counterfeit prevention Crypto Element with Protected Hardware-based Key Storage Secure Symmetric Authentication Device Host and Client Operations
Check Stock & Lead Times Packaging Options
Rohs Verified
The Infineon SLS32AIA series OPTIGA™ Trust M is a high-end security solution that provides an anchor of trust for connecting IoT devices to the cloud, giving every IoT device its own unique identity. This pre-personalized turnkey solution offers secured, zero-touch on boarding and the high performance needed for quick cloud access. High-end security controller Common criteria certified EAL6+ (high) hardware Turnkey solution Up to 10kB user memory PG-USON-10-2,-4 package (3 x 3 mm) Standard & extended temperature ranges I2C interface with shielded connection (encrypted communication)
Check Stock & Lead Times Packaging Options
Rohs Verified
The Infineon SLB9665TT20 OPTIGA™ TPM SLB 9665 features the Low Pin Count (LPC) interface. From the cycle types defined in the mentioned specification, only the TPM-type cycles (read and write) are supported. All accesses with different cycle types are ignored by the device. Compliant to TPM 2.0 Rev. 01.16 PIN compatible to SLB9660 Low Pin Count (LPC) to allow easy system integration Firmware upgrade to TPM 1.2 TCG and common criteria certified with EAL4+ FIPS 140-2 certified FW available via FW update
Check Stock & Lead Times Packaging Options
Maxim Integrated
Rohs Verified
The Maxim Integrated DS28S60 Deep Cover® cryptographic coprocessor easily integrates into embedded systems enabling confidentiality, authentication and integrity of information. With a fixed command set and no device-level firmware development required, the DS28S60 makes it fast and easy to implement full security for IoT devices. Secure Coprocessor with NIST-Compliant Hardware Based Crypto Robust Countermeasures Protect Against Security Attacks Enables Fast Time-to-Market with Easy End Application Integration High-Speed Interface for Host Microcontroller Communication Supplemental Features enable easy Integration into End Applications
Check Stock & Lead Times Packaging Options
Rohs Verified
Fast, Secure, and Cost Effective Symmetric Authentication. The Microchip SHA-based CryptoAuthentication crypto element devices have been architected to provide flexible user-configured security to enable a wide range of authentication models. The ATSHA204A is the first device in the SHA device group. The ATECC108A and ATECC508A are supersets of the ATSHA204A and thus upward compatible. As with all CryptoAuthentication devices, the ATSHA204A is easy to design in with no crypto expertise required. Secure Hash Algorithm (SHA) algorithms are widely used in most cryptographic systems and remain an important component in most modern authentication protocols. These devices support the SHA-256 standard. Symmetric Authentication Solution Fast Authentication Easy Key Management Best suited for counterfeit prevention Crypto Element with Protected Hardware-based Key Storage Secure Symmetric Authentication Device Host and Client Operations
Check Stock & Lead Times Packaging Options
Rohs Verified
The Infineon’s SLB 9670VQ2.0 Trusted Platform Module (TPM) SLB9670 is the latest product featuring a fully TCG TPM 2.0 standard compliant module with a SPI interface. TPMs are widely used as a root of trust for platform integrity, remote attestation and cryptographic services. The SLB 9670 is featuring a TCG-compliant SPI interface to facilitate host communication and is available in VQFN package and in standard and extended temperature range. With the SPI interface the SLB9670 can easily be integrated with all leading micro architectures. Compliant to TPM 2.0 Rev. 1.38 Firmware upgrade to TPM 1.2 SPI (serial peripheral interface) to allow easy system integration TCG and common criteria certified with EAL4+ FIPS 140-2 certified FW available via FW update FW with combined common criteria EAL4+ and FIPS 140-2 certification available
Check Stock & Lead Times Packaging Options
Rohs Verified
The Microchip Zero Touch Secure Provisioning Kit for AWS IoT helps designers to quickly and securely develop IoT devices that are in compliance with the AWS security regulations. These regulations state that a device must use mutual authentication with a remote server to be authorized on the AWS cloud. Meanwhile, a robust authentication must also ensure a complete isolation of the system credentials such as private keys from the application core to avoid leaving backdoors opened to software loop holes. In addition, the software is as secure as the user's skillset is in security. Cryptographic co-processor with secure hardware-based key storage Protected storage for up to 16 Keys, certificates or data Elliptic curve support Hardware support for symmetric algorithms SHA-256 & HMAC hash including off-chip context save/restore AES-128: encrypt/decrypt, galois field multiply for GCM Networking key management support Turnkey PRF/HKDF calculation for TLS 1.2 & 1.3
Check Stock & Lead Times Packaging Options
Rohs Verified
Authorization, Key Management, and Memory Encryption. The first device in the AES family, the ATAES132A, is a high-speed, high-security, 32K Serial EEPROM that enables authentication and confidential nonvolatile data storage. It is a direct drop-in for industry standard Serial EEPROMS and is an easy way to add security to a system. The ATES132A includes a high-quality hardware Random Number Generator (RNG) paired with a Federal Information Processing Standards (FIPS) Deterministic Random Bit Generator (DRBG) to prevent replay attacks. AES Algorithm with 128-bit Keys AES-CCM for Authentication Secure Storage for 16 and 128 bit Keys Encrypted User Memory Read and Write FIPS Random Number Generator (RNG) 16 High-Endurance Monotonic EEPROM Counters Authentication Prior to Zone Access Read/Write, Encrypted, or Read-only User Zone Options Serial EEPROM Compatible Pinout (SOIC, SOP, or UDFN) Easily Add Security by Replacing Existing Serial EEPROM
Check Stock & Lead Times Packaging Options
Rohs Verified
The Microchip CryptoAuthentication device with secure hardware based key storage. It is used for IoT network endpoint key management & exchange, ecosystem control and anti cloning. High quality Secure boot support:
Check Stock & Lead Times Packaging Options
Rohs Verified
The ATECC508A crypto element is the first crypto device to integrate ECDH (Elliptic Curve Diffie–Hellman) key agreement, which makes it easy to add confidentiality (encryption/decryption) to digital systems including Internet of Things (IoT) nodes used in home automation, industrial networking, accessory and consumable authentication, medical, mobile and other applications. In addition to ECDH, the ATECC508A has ECDSA sign-verify capabilities built-in to provide highly secure asymmetric authentication. Additional Features: Easy way to run ECDSA and ECDH Key Agreement ECDH key agreement makes encryption/decryption easy Ideal for IoT node security Authentication without the need for secure storage in the host No requirement for high-speed computing in client devices Cryptographic accelerator with Secure Hardware-based Key Storage Performs High-Speed Public Key (PKI) Algorithms
Check Stock & Lead Times Packaging Options
Maxim Integrated
Rohs Verified
The Maxim Integrated DS28E40 is a secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. It has one GPIO pin with optional authentication control It has optional chip-generated Pr/Pu key pairs for ECC operations It offers 6Kb of one-time programmable (OTP) for user data, keys, and certificates It has unique and unalterable factory-programmed 64-Bit identification number (ROM ID) It has single-contact, 1-wire interface communication with host at 9.09kbps and 62.5kbps
Check Stock & Lead Times Packaging Options

New Added Items
Added items
Infineon SLB9665TT20FW563XUMA3 7.206kB 28-Pin Crypto Authentication IC TSSOP-28
The Infineon SLB9665TT20 OPTIGA™ TPM SLB 9665 features the Low Pin Count (LPC) interface. From the cycle types defined in the mentioned specification, only the TPM-type cycles (read and write) are supported. All accesses with different cycle types are ignored by the device. Compliant to TPM 2.0 Rev. 01.16 PIN compatible to SLB9660 Low Pin Count (LPC) to allow easy system integration Firmware upgrade to TPM 1.2 TCG and common criteria certified with EAL4+ FIPS 140-2 certified FW available via FW update
Added items
Infineon SLS32AIA010MLUSON10XTMA2 10kB 10-Pin Crypto Authentication IC USON-10
The Infineon SLS32AIA series OPTIGA™ Trust M is a high-end security solution that provides an anchor of trust for connecting IoT devices to the cloud, giving every IoT device its own unique identity. This pre-personalized turnkey solution offers secured, zero-touch on boarding and the high performance needed for quick cloud access. High-end security controller Common criteria certified EAL6+ (high) hardware Turnkey solution Up to 10kB user memory PG-USON-10-2,-4 package (3 x 3 mm) Standard & extended temperature ranges I2C interface with shielded connection (encrypted communication)
Added items
Infineon SLS32AIA020X2USON10XTMA4 10kB 10-Pin Crypto Authentication IC USON-10
The Infineon SLS32AIA series OPTIGA™ Trust X reduces integration effort and is easy to use making it ideal for customers who lack security expertise but nonetheless need fast time-to-market. This premium security solution offers high performance and low power consumption. It supports non-rich operating systems and comes in compact packages. It enables new features and business models which help you to differentiate your offering and stay ahead of the competition. High-end security controller Turnkey solution Mutual authentication using ECDSA DTLS client IETF standard RFC 6347 Secure communication using DTLS Compliant with the usb type-C™ authentication standard I2C interface Up to 10 kB user memory
Added items
ATSHA204A-MAHDA-T, Peripheral Controller Atmel Crypto EEPROM 8-Pin UDFN
Fast, Secure, and Cost Effective Symmetric Authentication. The Microchip SHA-based CryptoAuthentication crypto element devices have been architected to provide flexible user-configured security to enable a wide range of authentication models. The ATSHA204A is the first device in the SHA device group. The ATECC108A and ATECC508A are supersets of the ATSHA204A and thus upward compatible. As with all CryptoAuthentication devices, the ATSHA204A is easy to design in with no crypto expertise required. Secure Hash Algorithm (SHA) algorithms are widely used in most cryptographic systems and remain an important component in most modern authentication protocols. These devices support the SHA-256 standard. Symmetric Authentication Solution Fast Authentication Easy Key Management Best suited for counterfeit prevention Crypto Element with Protected Hardware-based Key Storage Secure Symmetric Authentication Device Host and Client Operations
Added items
AT88SC0104CA-SH, Peripheral Controller Atmel Crypto EEPROM 8-Pin SOIC
The Atmel AT88SC0104CA member of the Atmel CryptoMemory®family is a high-performance secure memory providing 1-Kbit of user memory with advanced security and cryptographic features built in. The user memory is divided into four 32-byte zones, each of which may be individually set with different security access rights or effectively combined together to provide space for one to four data files. One of a family of devices with user memories from 1-Kbit to 8-Kbit 1-Kbit (128-byte) EEPROM user memory Four 256-bit (32-byte) zones Self-timed write cycle Single byte or 16-byte page write mode Programmable access rights for each zone 2-Kbit configuration zone 37-byte OTP Area for User-defined Codes 160-byte Area for User-defined Keys and Passwords High security features 64-bit mutual authentication protocol (under license of ELVA) Cryptographic Message Authentication Codes (MAC) Stream encryption Four key sets for authentication and encryption Eight sets of two 24-bit passwords
Added items
Infineon SLB9670VQ20FW785XTMA1 6.962kB 32-Pin Crypto Authentication IC VQFN-32
The Infineon’s SLB 9670VQ2.0 Trusted Platform Module (TPM) SLB9670 is the latest product featuring a fully TCG TPM 2.0 standard compliant module with a SPI interface. TPMs are widely used as a root of trust for platform integrity, remote attestation and cryptographic services. The SLB 9670 is featuring a TCG-compliant SPI interface to facilitate host communication and is available in VQFN package and in standard and extended temperature range. With the SPI interface the SLB9670 can easily be integrated with all leading micro architectures. Compliant to TPM 2.0 Rev. 1.38 Firmware upgrade to TPM 1.2 SPI (serial peripheral interface) to allow easy system integration TCG and common criteria certified with EAL4+ FIPS 140-2 certified FW available via FW update FW with combined common criteria EAL4+ and FIPS 140-2 certification available
Added items
Cryptoathentication ECC608A UDFN
The Microchip Zero Touch Secure Provisioning Kit for AWS IoT helps designers to quickly and securely develop IoT devices that are in compliance with the AWS security regulations. These regulations state that a device must use mutual authentication with a remote server to be authorized on the AWS cloud. Meanwhile, a robust authentication must also ensure a complete isolation of the system credentials such as private keys from the application core to avoid leaving backdoors opened to software loop holes. In addition, the software is as secure as the user's skillset is in security. Cryptographic co-processor with secure hardware-based key storage Protected storage for up to 16 Keys, certificates or data Elliptic curve support Hardware support for symmetric algorithms SHA-256 & HMAC hash including off-chip context save/restore AES-128: encrypt/decrypt, galois field multiply for GCM Networking key management support Turnkey PRF/HKDF calculation for TLS 1.2 & 1.3
Added items
ATAES132A-SHER-B, Peripheral Controller 32K AES Serial EEPROM 8-Pin SOIC
Authorization, Key Management, and Memory Encryption. The first device in the AES family, the ATAES132A, is a high-speed, high-security, 32K Serial EEPROM that enables authentication and confidential nonvolatile data storage. It is a direct drop-in for industry standard Serial EEPROMS and is an easy way to add security to a system. The ATES132A includes a high-quality hardware Random Number Generator (RNG) paired with a Federal Information Processing Standards (FIPS) Deterministic Random Bit Generator (DRBG) to prevent replay attacks. AES Algorithm with 128-bit Keys AES-CCM for Authentication Secure Storage for 16 and 128 bit Keys Encrypted User Memory Read and Write FIPS Random Number Generator (RNG) 16 High-Endurance Monotonic EEPROM Counters Authentication Prior to Zone Access Read/Write, Encrypted, or Read-only User Zone Options Serial EEPROM Compatible Pinout (SOIC, SOP, or UDFN) Easily Add Security by Replacing Existing Serial EEPROM
Added items
8-Pin Crypto Authentication IC SOIC
The Microchip CryptoAuthentication device with secure hardware based key storage. It is used for IoT network endpoint key management & exchange, ecosystem control and anti cloning. High quality Secure boot support:
Added items
Microchip ATECC508A-SSHDA-B 10kB 8-Pin Crypto Authentication IC SOIC
The ATECC508A crypto element is the first crypto device to integrate ECDH (Elliptic Curve Diffie–Hellman) key agreement, which makes it easy to add confidentiality (encryption/decryption) to digital systems including Internet of Things (IoT) nodes used in home automation, industrial networking, accessory and consumable authentication, medical, mobile and other applications. In addition to ECDH, the ATECC508A has ECDSA sign-verify capabilities built-in to provide highly secure asymmetric authentication. Additional Features: Easy way to run ECDSA and ECDH Key Agreement ECDH key agreement makes encryption/decryption easy Ideal for IoT node security Authentication without the need for secure storage in the host No requirement for high-speed computing in client devices Cryptographic accelerator with Secure Hardware-based Key Storage Performs High-Speed Public Key (PKI) Algorithms
Added items
3.6kB 12-Pin Crypto Authentication IC TDFN
The Maxim Integrated DS28S60 Deep Cover® cryptographic coprocessor easily integrates into embedded systems enabling confidentiality, authentication and integrity of information. With a fixed command set and no device-level firmware development required, the DS28S60 makes it fast and easy to implement full security for IoT devices. Secure Coprocessor with NIST-Compliant Hardware Based Crypto Robust Countermeasures Protect Against Security Attacks Enables Fast Time-to-Market with Easy End Application Integration High-Speed Interface for Host Microcontroller Communication Supplemental Features enable easy Integration into End Applications
Added items
Microchip AT88SC25616C-SU 256kB 8-Pin Crypto Authentication IC SOIC
The first device in the AES family, the ATAES132A, is a high-speed, high-security, 32K Serial EEPROM that enables authentication and confidential nonvolatile data storage. It is a direct drop-in for industry standard Serial EEPROMS and is an easy way to add security to a system. The ATES132A includes a high-quality hardware Random Number Generator (RNG) paired with a Deterministic Random Bit Generator (DRBG) to prevent replay attacks. 32Kb Standard Serial EEPROM User Memory (16 User Zones of 2Kb) AES Algorithm with 128-bit Keys AES-CCM for Authentication Secure Storage for 16 and 128 bit Keys Encrypted User Memory Read and Write Random Number Generator (RNG) 16 High-Endurance Monotonic EEPROM
FAQs

We offer free shipping for orders over £200 if delivery is in the UK. All other orders in the UK, shipping from £7.99 depending on the weight and measurement. Mainland Europe shipping charges start from £25. For all other countries shipping charges start from £50 for products like Security & Authentication Chips and all others.

You can email us directly at sales@enrgtech.co.uk or via our website for any queries regarding Security & Authentication Chips or any other product.

This depends on the Security & Authentication Chips individual product and information that can be found on our website.

Yes, we offer special discounts on orders above £200 for Security & Authentication Chips and all other products.

UK orders normally take between 2/3 working days. International orders normally take between 3/5 working days for all products including Security & Authentication Chips.

Yes. We keep updating our stock frequently and if a product like Security & Authentication Chips is not in stock then we will let you know.