Microchip ATECC508A-SSHDA-T 8-Pin Crypto Authentication IC SOIC
- N° de stock RS:
- 146-8912P
- Référence fabricant:
- ATECC508A-SSHDA-T
- Fabricant:
- Microchip
Offre groupée disponible
Sous-total 30 unités (conditionné en bande continue)*
27,18 €
(TVA exclue)
32,88 €
(TVA incluse)
Frais de livraison offerts pour toute commande de plus de 75,00 €
Temporairement en rupture de stock
- Expédition à partir du 26 janvier 2026
Besoin de plus? Cliquez sur " Vérifier les dates de livraison " pour plus de détails
Unité | Prix par unité |
|---|---|
| 30 + | 0,906 € |
*Prix donné à titre indicatif
- N° de stock RS:
- 146-8912P
- Référence fabricant:
- ATECC508A-SSHDA-T
- Fabricant:
- Microchip
Spécifications
Documentation technique
Législations et de normes
Détails du produit
Recherchez des produits similaires en sélectionnant un ou plusieurs attributs.
Sélectionner tout | Attribut | Valeur |
|---|---|---|
| Marque | Microchip | |
| Package Type | SOIC | |
| Pin Count | 8 | |
| Minimum Operating Supply Voltage | 2 V | |
| Maximum Operating Supply Voltage | 5.5 V | |
| Sélectionner tout | ||
|---|---|---|
Marque Microchip | ||
Package Type SOIC | ||
Pin Count 8 | ||
Minimum Operating Supply Voltage 2 V | ||
Maximum Operating Supply Voltage 5.5 V | ||
The ATECC508A crypto element integrates Elliptic Curve Diffie–Hellman key agreement, which makes it easy to add confidentiality to digital systems including Internet of Things nodes used in home automation, industrial networking, accessory and consumable authentication, mobile and other applications. The ATECC508A has ECDSA sign-verify capabilities built-in to provide secure asymmetric authentication. The combination of ECDH and ECDSA provides all three pillars of security: confidentiality, data integrity and authentication when used with MCU or MPUs running encryption/decryption algorithms in software.
Easy way to run ECDSA and ECDH Key Agreement
ECDH key agreement makes encryption/decryption easy
Ideal for IoT node security
Authentication without the need for secure storage in the host
No requirement for high-speed computing in client devices
Cryptographic accelerator with Secure Hardware-based Key Storage
Performs High-Speed Public Key (PKI) Algorithms
Elliptic Curve Support
ECDH key agreement makes encryption/decryption easy
Ideal for IoT node security
Authentication without the need for secure storage in the host
No requirement for high-speed computing in client devices
Cryptographic accelerator with Secure Hardware-based Key Storage
Performs High-Speed Public Key (PKI) Algorithms
Elliptic Curve Support
