This Day On The Street
Continue to site
ADVERTISEMENT
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here

Atmel Expands CryptoAuthentication Portfolio With Elliptical Curve Asymmetric Key Authentication Solutions

SAN JOSE, Calif., June 24, 2013 /PRNewswire/ -- Atmel Corporation (NASDAQ: ATML), a leader in microcontroller (MCU) and touch technology solutions, today announced the expansion of its CryptoAuthentication™ portfolio to include the ATECC108 solution with elliptical curve (ECC) asymmetric key algorithm.

(Logo:   http://photos.prnewswire.com/prnh/20120530/SF15228LOGO)

Atmel's ATECC108 solution delivers advanced security features to support some of the latest security standards from the National Institute of Standards and Technology (NIST) including the P256, B283 and K283 elliptical curves, and FIPS 186-3 elliptical curve digital signature algorithm. The easy-to-use solution also delivers up to 8.5Kb EEPROM, allowing storage for up to 16 keys, a unique 72-bit serial number and a FIPS standard-based random number generator. The combined features make the ATECC108 solution ideal for consumer electronics, consumables, medical devices, industrial, automation and IP licensing applications that require increased security controls when communicating with other devices or to the Internet.

The ATECC108 is a perfect solution for authenticating system accessories, consumables and spare parts. Through authentication, the manufacturer can ensure their revenue stream and product quality are protected by only allowing OEM-authorized accessories to work with their equipment. This device also delivers an overall lower bill of material (BOM) by only requiring one security chip on the accessory side without the need to protect the key storage on the host system side since the host only needs to store a public key. The device is easy to design in and in many cases will require nothing more than a software upgrade on the host system.

According to the NSA*, "New techniques have been developed which offer both better performance and higher security than first generation public key techniques. The best assured group of new public key techniques is built on the arithmetic of elliptic curves. [As one] scales security upwards over time to meet the evolving threat posed by eavesdroppers and hackers with access to greater computing resources, elliptic curves begin to offer dramatic savings over the old, first generation techniques."  

1 of 2

Check Out Our Best Services for Investors

Action Alerts PLUS

Portfolio Manager Jim Cramer and Director of Research Jack Mohr reveal their investment tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
Quant Ratings

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
Stocks Under $10

David Peltier uncovers low dollar stocks with serious upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
14-Days Free
Only $9.95
14-Days Free
SYM TRADE IT LAST %CHG

Markets

DOW 18,285.74 +0.34 0.00%
S&P 500 2,130.82 +4.97 0.23%
NASDAQ 5,090.7940 +19.0510 0.38%

Partners Compare Online Brokers

Free Reports

Top Rated Stocks Top Rated Funds Top Rated ETFs