ATECC508A
The ATECC508A with secure hardware-based key storage supports full 256-bit ECC and is the first
device to integrate ECDH (Elliptic Curve Diffie–Hellman) key agreement, which makes it easy to add
confidentiality (encryption/decryption) to digital systems including Internet of Things (IoT) nodes used
in home automation, industrial networking, accessory and consumable authentication, medical, mobile,
and other applications.
In addition to ECDH, the ATECC508A has ECDSA (Elliptic Curve Digital Signature Algorithm)
sign-verify capabilities built-in to provide highly secure asymmetric authentication. The combination of
ECDH and ECDSA makes the device an ideal way to provide all three pillars of security
(confidentiality, data integrity, and authentication) when used with MCU or MPUs running
encryption/decryption algorithms (e.g. AES) in software. Similar to all Atmel CryptoAuthentication
products, the ATECC508A employs ultra-secure hardware-based cryptographic key storage and
cryptographic countermeasures which are more secure than software-based key storage.
Able to support asymmetric authentication, there is no need for secure storage in the host. An
EEPROM array is included for storage of up to 16 keys, miscellaneous read/write, read-only or secret
data, consumption logging, and security configurations. Access to memory can be restricted in a
variety of ways and the configuration can be locked to prevent changes. Access is through a standard
2
I
C Interface at speeds of up to 1Mb/s. It supports a SWI, which can reduce the number of GPIOs
required on the system MCU. Multiple ATECC508A devices can share the same bus, which saves
processor GPIO usage in systems with multiple clients.
The ATECC508A can generate high-quality FIPS random numbers for any purpose ensuring that
replay attacks (i.e. re-transmitting a previously successful transaction) always fail. System integration is
easy due to a wide supply voltage range (2.0V to 5.5V) and an ultra-low sleep current (<150nA).
For additional information please go to: www.atmel.com/devices/atecc508a.aspx.
Get Started
The following discusses the steps to start using the demonstration-evaluation kit.
Step 1
Download ACES Software at
ACES is a Windows-based application software used to interface with the demo-evaluation kits. ACES
works with the Kit Protocol noted in Step 5. The ACES software is located at:
www.atmel.com/tools/ATMELCRYPTOEVALUATIONSTUDIO_ACES.aspx
Register and download the ACES Setup File (ACES_Setup_x.x.x.exe). Install the setup file and follow
the instructions in the set-up wizard to complete the installation. The ACES Configuration Environment
(CE) icon will be placed on the desktop.
The AT88CK590 requires ACES 5.0.0 or later.
The AT88CK490 will work with earlier versions of ACES.
Start the ACES CE Software Program. Either open the program via the desktop icon or via the Start
menu > All Programs > Atmel Crypto Solutions > ACES > ACES CE.
When the kit is plugged into the USB port, ACES will automatically detect that the kit is attached and
launch the Kit Detection dialogue box.
CryptoAuthentication USB Dongle Demo-Evaluation Kits [HARDWARE USER GUIDE]
6
6
Atmel-8945A-CryptoAuth-USB-Dongle-Demo-Eval-Kits-Hardware-UserGuide_052015
www.atmel.com
Need help?
Do you have a question about the CryptoAuthentication AT88CK490 and is the answer not in the manual?
Questions and answers