Contact Us
SalesDept@heisener.com +86-755-83210559 ext. 811

ATECC108-MAHDA-T

ATECC108-MAHDA-T

ATECC108-MAHDA-T

For Reference Only

Part Number ATECC108-MAHDA-T
Manufacturer Microchip Technology
Description ECC 8KB, 8-UDFN, I2C, T&R
Datasheet ATECC108-MAHDA-T Datasheet
Package 8-UFDFN Exposed Pad
In Stock 423 piece(s)
Unit Price Request a Quote
Lead Time To be Confirmed
Estimated Delivery Time Jul 18 - Jul 23 (Choose Expedited Shipping)
Request for Quotation

Part Number # ATECC108-MAHDA-T (Specialized ICs) is manufactured by Microchip Technology and distributed by Heisener. Being one of the leading electronics distributors, we carry many kinds of electronic components from some of the world’s top class manufacturers. Their quality is guaranteed by its stringent quality control to meet all required standards.

For ATECC108-MAHDA-T specifications/configurations, quotation, lead time, payment terms of further enquiries please have no hesitation to contact us. To process your RFQ, please add ATECC108-MAHDA-T with quantity into BOM. Heisener.com does NOT require any registration to request a quote of ATECC108-MAHDA-T.

ATECC108-MAHDA-T Specifications

ManufacturerMicrochip Technology
CategoryIntegrated Circuits (ICs) - Specialized ICs
Datasheet ATECC108-MAHDA-TDatasheet
Package8-UFDFN Exposed Pad
SeriesCryptoAuthentication?
TypeAuthentication Chip
ApplicationsNetworking and Communications
Mounting TypeSurface Mount
Package / Case8-UFDFN Exposed Pad
Supplier Device Package8-UDFN (2x3)

ATECC108-MAHDA-T Datasheet

Page 1

Page 2

This is a summary document. The complete document is available under NDA. For more information, please contact your local Atmel sales office. NOT RECOMMENDED FOR NEW DESIGNS Replaced by ATECC108A ATECC108 Atmel CryptoAuthentication SUMMARY DATASHEETFeatures  Secure authentication and product validation device  High-Speed Public Key Algorithm (PKI) Crypto Engine - FIPS186-3 Elliptic Curve Digital Signature Algorithm (ECDSA)  NIST Standard P256, B283, and K283 Elliptic Curve support  Superior SHA-256 Hash Algorithm; HMAC option  Integrated capability for both Host and Client operations  Best in class 256/283-bit key length, storage for up to 16 keys  Guaranteed unique 72-bit serial number  Internal high-quality FIPS Random Number Generator (RNG)  8.5Kb EEPROM memory for keys, certificates, and data  512 One Time Programmable (OTP) bits for fixed information or consumption logging  Multiple I/O options - High-Speed single pin interface, with one GPIO pin - 1MHz standard I2C interface  Integrated temperature sensor - Uncalibrated accuracy, -40C to +85C (±3C)  2.0V – 5.5V supply voltage range  1.8V – 5.5V communications  <150nA sleep current  Extended multi-level hardware security  8-lead SOIC, 8-pad UDFN, and 3-lead CONTACT packages Applications  Anti-clone for accessories, daughter cards, and consumables  Secure boot validation — software anti-piracy  Network and computer access control and password handling  Authenticated/encrypted network communicationsAtmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013

Page 3

Figure 1. Pin Configurations Pin Name Function NC No Connect GND Ground SDA Serial Data SCL Serial Clock Input VCC Power Supply NC NC NC GND 1 2 3 4 8 7 6 5 8-lead SOIC VCC NC SCL SDA Top View 8-pad UDFN Bottom View VCC NC SCL SDA NC NC NC GND 1 2 3 4 8 7 6 5 3-lead Contact 1 2 3 SDA GND VCC Bottom ViewATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013 2

Page 4

1. Introduction 1.1 Applications The Atmel® ATECC108 is a member of the Atmel CryptoAuthentication™ family of high-security hardware authentication devices. It has a flexible command set that allows use for many applications, including the following:  Anti-Counterfeiting — Validates that a removable, replaceable, or consumable client is authentic. Examples of clients could be system accessories, electronic daughter cards, or other spare parts. It can also be used to validate a software/firmware module or memory storage element.  Protection for Firmware or Media — Validate code stored in flash memory at boot to prevent unauthorized modifications, encrypt downloaded program files as a common broadcast, or uniquely encrypt code images to be usable on a single system only.  Secure Data Storage — Store secret keys for use by crypto accelerators in standard microprocessors. ATECC108 can also be used to store small quantities of data necessary for configuration, calibration, ePurse value, consumption data, or other secrets. Programmable protection is available using encrypted/authenticated reads and writes.  User Password Checking — Validates user entered passwords without letting the expected value become known, map memorable passwords to random number, and securely exchange password values with remote system. 1.2 Device Features ATECC108 includes an EEPROM array that can be used for storage of up to 16 keys, miscellaneous read/write, read-only or secret data, consumption logging, and security configuration. Access to the various sections of memory can be restricted in a variety of ways and then the configuration locked to prevent changes. ATECC108 features a wide array of defensive mechanisms specifically designed to prevent physical attacks on the device itself or logical attacks on the data transmitted between the device and the system. Hardware restrictions on the ways in which keys are used or generated provide further defense against certain styles of attack. Access to the device is through a standard I2C Interface at speeds up to 1Mb/sec. It is compatible with standard Serial EEPROM I2C interface specifications. The device also supports a Single-Wire Interface that can reduce the number of GPIOs required on the system processor and/or reduce the number of pins on connectors. Additionally, the device supports an alternative Single-Wire Interface compatible with other single-wire devices. If either Single- Wire Interface is enabled, the remaining pin is available for use as a GPIO. Contact Atmel for more details. Using either the I2C or Single-Wire Interface, multiple ATECC108 devices can share the same bus which saves processor GPIO usage in system with multiple clients such as different color ink tanks or multiple spare parts. Each ATECC108 ships with a guaranteed unique 72-bit serial number. Using the cryptographic protocols supported by the device, a Host system or remote server can verify a signature to prove that the serial number is both authentic and not a copy. Serial numbers are often stored in a standard Serial EEPROM but these can be easily copied, and there is no way for the Host to know if the serial number is authentic or if it's a clone. ATECC108 can generate high-quality FIPS random numbers and employ them for any purpose, including usage as part of the device’s crypto protocols. Because each random number is guaranteed to be essentially unique from all numbers ever generated on this or any other device, their inclusion in the protocol calculation ensures that replay attacks (re-transmitting a previously successful transaction) always fails. System integration is eased with a wide supply voltage range (2.0V – 5.5V) and an ultra-low sleep current of <150nA. 3ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013

Page 5

1.3 Cryptographic Operation ATECC108 implements a complete asymmetric (public/private) key cryptographic signature solution based on Elliptic Curve Cryptography and the ECDSA signature protocol. The device features hardware acceleration for the NIST standard P256, B283, and K283 binary curves and supports the complete key life cycle from high quality private key generation, ECDSA signature generation and public key signature verification. The hardware accelerator can implement these asymmetric cryptographic operations 10 to 1,000 times faster than software running on standard microprocessors without the usual high risk of key exposure. The device is designed to be able to securely store multiple private keys along with their public keys and the signature components of the corresponding certificates. The signature verification command can use any stored or external ECC public key. Public keys stored within the device can be configured to require validation via a certificate chain to speed up future device authentication. Random private key generation is supported internally within the device to ensure that the private key can never be known outside the device. The public key corresponding to a stored private key is always returned when the key is generated and may optionally be computed at a later time. ATECC108 also supports a standard hash-based challenge response protocol to simplify programming. At its most basic, the system sends a challenge to the device which combines that challenge with a secret key via the MAC command from the system, and sends the response back to the system. The device uses a SHA-256 cryptographic hash algorithm for the combination such that an observer on the bus cannot derive the value of the secret key, but the recipient can verify that the response is correct by performing the same calculation with a stored copy of the secret. Due to the flexible command set of the ATECC108, these two basic operation sets (ECDSA signatures and SHA- 256 challenge-response) can be expanded in many ways. Using the GenDig command, the values in other slots can be included in the response digest or signature, which provides an effective way of proving that a data read really did come from the device, as opposed to being inserted by a man-in-the-middle attacker. This same command can be used to combine two keys with the challenge, which is useful when there are multiple layers of authentication to be performed. The DeriveKey command implements a key rolling scheme. Depending on the command mode parameter, the resulting operation can be similar to that implemented in a remote-controlled garage door opener. Each time the key is used, the current value of the key is cryptographically combined with a value specific to that system, and the result forms the key for the next cryptographic operation. Even if an attacker gets the value of one key, with the next use, that key will be gone forever. The DeriveKey command can also be used to generate new random keys that might be valid only for a particular Host ID, for a particular time period, or for some other restricted environment. Each generated key is different than any other key ever generated on any device. By activating a Host-Client pair in the field in this manner, a clone of a single client will not work on any other Host. In a Host-Client configuration, where the Host (for instance a mobile phone) needs to verify a client (for instance an OEM battery), there is a need to store the secret in the Host in order to validate the response from the client. The CheckMac command allows the device to securely store the secret in the Host system and hides the correct response value from the pins, returning only a yes or no answer to the system. Where a user entered password is required, the CheckMac command also provides a way to both verify the password without exposing it on the communications bus, as well as, mapping the password into a stored value that can have a much higher entropy. Finally, the hash combination of a challenge and secret key can be kept on the device and XOR’d with the contents of a slot to implement an encrypted Read command, or it can be XOR’d with encrypted input data to implement an encrypted Write command. All hashing functions are implemented using the industry-standard SHA-256 secure hash algorithm, which is part of the latest set of high-security cryptographic algorithms recommended by various governments and cryptographic experts. If desired, the SHA-256 algorithm can also be included in a HMAC sequence. ATECC108 employs full-sized 256 bit secret keys to prevent any kind of exhaustive attack.ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013 4

Page 6

2. Electrical Characteristics 2.1 Absolute Maximum Ratings* 2.2 Reliability ATECC108 is fabricated with the high reliability of the Atmel CMOS EEPROM manufacturing technology. Table 2-1. EEPROM Reliability Operating Temperature . . . . . . . . . . . . . -40C to 85C Storage Temperature . . . . . . . . . . . . . -65C to 150C Maximum Operating Voltage . . . . . . . . . . . . . . . . 6.0V DC Output Current. . . . . . . . . . . . . . . . . . . . . . . 5.0mA Voltage on any pin. . . . . . . . . . . -0.5V to (VCC + 0.5V) *Notice: Stresses beyond those listed under “Absolute Maximum Ratings” may cause permanent damage to the device. This is a stress rating only and functional operation of the device at these or any other condition beyond those indicated in the operational sections of this specification is not implied. Exposure to absolute maximum rating conditions for extended periods may affect device reliability. Parameter Min Typical Max Units Write Endurance (each byte) 100,000 Write Cycles Data Retention (at 55C) 10 Years Data Retention (at 35C) 30 50 Years Read Endurance Unlimited Read Cycles 5ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013

Page 7

3. Ordering Information Notes: 1. B = Bulk 2. T = Tape and reel  SOIC = 4K per reel  UDFN and CONTACT = 5K per reel 3. Please contact Atmel for availability. Ordering Code Package Interface Configuration ATECC108-SSHCZ-T SOIC, Tape and Reel(2) Single-Wire ATECC108-SSHCZ-B SOIC, Bulk in Tubes(1) Single-Wire ATECC108-SSHDA-T SOIC, Tape and Reel(2) I2C ATECC108-SSHDA-B SOIC, Bulk in Tubes(1) I2C ATECC108-MAHCZ-T UDFN, Tape and Reel(2) Single-Wire ATECC108-MAHDA-T UDFN, Tape and Reel(2) I2C ATECC108-RBHCZ-T(3) 3-lead CONTACT, Tape and Reel(2) Single-Wire 8S1 8-lead 0.150” wide, Plastic Gull Wing Small Outline (JEDEC SOIC) 8MA2 8-pad, 2.0mm x 3.0mm x 0.6mm body, Thermally Enhanced Plastic Ultra Thin Dual Flat No Lead (UDFN) 3RB 3-lead 2.5mm x 6.5mm body, 2.0mm pitch, CONTACT (Sawn)ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013 6

Page 8

4. Package Drawings 4.1 8S1 — 8-lead SOIC DRAWING NO. REV. TITLE GPC COMMON DIMENSIONS (Unit of Measure = mm) SYMBOL MIN NOM MAX NOTE A1 0.10 – 0.25 A 1.35 – 1.75 b 0.31 – 0.51 C 0.17 – 0.25 D 4.80 – 5.05 E1 3.81 – 3.99 E 5.79 – 6.20 e 1.27 BSC L 0.40 – 1.27 Ø 0° – 8° Ø E 1 N TOP VIEW C E1 END VIEW A b L A1 e D SIDE VIEW Package Drawing Contact: packagedrawings@atmel.com 8S1 G 6/22/11 Notes: This drawing is for general information only. Refer to JEDEC Drawing MS-012, Variation AA for proper dimensions, tolerances, datums, etc. 8S1, 8-lead (0.150” Wide Body), Plastic Gull Wing Small Outline (JEDEC SOIC) SWB 7ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013

Page 9

4.2 8MA2 — 8-pad UDFN TITLE DRAWING NO. GPC REV. Package Drawing Contact: packagedrawings@atmel.com 8MA2YNZ C 8MA2, 8-pad, 2 x 3 x 0.6 mm Body, Thermally Enhanced Plastic Ultra Thin Dual Flat No Lead Package (UDFN) COMMON DIMENSIONS (Unit of Measure = mm) SYMBOL MIN NOM MAX NOTE D 1.90 2.00 2.10 E 2.90 3.00 3.10 D2 1.40 1.50 1.60 E2 1.20 1.30 1.40 A 0.50 0.55 0.60 A1 0.0 0.02 0.05 A2 – – 0.55 C 0.152 REF L 0.30 0.35 0.40 e 0.50 BSC b 0.18 0.25 0.30 3 K 0.20 – – 9/6/12 D2 E2 E e (6x) L (8x) b (8x) Pin#1 ID A A1 A2 Pin 1 ID D C K 8 7 6 5 1 2 3 4 1 2 3 4 8 7 6 5 ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013 8

Page 10

4.3 3RB — 3-lead CONTACT DRAWING NO. REV. TITLE GPC COMMON DIMENSIONS (Unit of Measure = mm) SYMBOL MIN NOM MAX NOTE D 2.40 2.50 2.60 E 6.40 6.50 6.60 A 0.45 0.50 0.55 A1 0.0 - 0.05 e 1.60 1.70 1.80 b 2.00 BSC L 2.10 2.20 2.30 f 0.30 0.40 0.50 g 0.05 0.15 0.25 3RB A 12/16/11 3RB, 3-lead 2.5x6.5mm Body, 2.0 mm pitch, CONTACT PACKAGE. (Sawn) RHB TOP VIEW SIDE VIEW BOTTOM VIEW e (3x) D E Pin 1 Pin 1 f g 0.30 REF 0.30 REF L (3x) b A A1 f 0.10 C d 0.08 C B A C Package Drawing Contact: packagedrawings@atmel.com 9ATECC108 [SUMMARY DATASHEET] Atmel-8873BS-CryptoAuth-ATECC108-Datasheet-Summary_102013

ATECC108-MAHDA-T Reviews

Average User Rating
5 / 5 (69)
★ ★ ★ ★ ★
5 ★
62
4 ★
7
3 ★
0
2 ★
0
1 ★
0

Write a Review

Not Rated
Thanks for Your Review!

Emmal*****entry

June 24, 2020

Great service as always from this supplier. Already bought many times

Kend*****Bawa

June 21, 2020

I love this website, and get a quick response. Good experience! Good customer service.

Ales*****Willis

June 14, 2020

Worked good to turn my AC welder into a DC welder.

Flor***** Kar

June 7, 2020

All OK, fast delivery, good quality. Product works as it should, Nice Seller.

Derr*****Chung

June 4, 2020

Happy with purchase, would do business again

Keaga*****annan

May 31, 2020

Fantastic quality products with fair and prompt shipping. Would save much time crossing all the features. Thank you for all your effort.

Cru*****loyd

May 30, 2020

Used it on my system it works perfect as I need.

Brixt*****kenzie

May 25, 2020

Worked perfectly for my application. Worked like a charm!

Ever*****Zamora

May 20, 2020

I took time to note down but perfect after several months of use

Tian*****rcado

May 18, 2020

received with well packed and good parts, every piece of the ATECC108-MAHDA-T works well.

ATECC108-MAHDA-T Guarantees

Service Guarantee

Service Guarantees

We guarantee 100% customer satisfaction.

Our experienced sales team and tech support team back our services to satisfy all our customers.

Quality Guarantee

Quality Guarantees

We provide 90 days warranty.

If the items you received were not in perfect quality, we would be responsible for your refund or replacement, but the items must be returned in their original condition.

ATECC108-MAHDA-T Packaging

Verify Products
Customized Labels
Professional Packaging
Sealing
Packing
Insepction

ATECC108-MAHDA-T Related Products

KSD1413TU KSD1413TU Fairchild/ON Semiconductor, TRANS NPN DARL 40V 3A TO-220F, TO-220-3 Full Pack, CryptoAuthentication? View
MAX5250BCAP+ MAX5250BCAP+ Maxim Integrated, IC DAC QUAD V-OUT10BIT LP 20SSOP, 20-SSOP (0.209", 5.30mm Width), CryptoAuthentication? View
8304AMLNT 8304AMLNT IDT, Integrated Device Technology Inc, IC CLK BUFFER 1:4 200MHZ 8SOIC, 8-SOIC (0.154", 3.90mm Width), CryptoAuthentication? View
IMN26188C IMN26188C Crouzet, IPD M18 NONSHLD 3W SPST 2M, Cylinder, Threaded - M18, CryptoAuthentication? View
TX2SA-L2-6V-Z TX2SA-L2-6V-Z Panasonic Electric Works, RELAY TELECOM DPDT 2A 6V, -, CryptoAuthentication? View
744C043105JTR 744C043105JTR CTS Resistor Products, RES ARRAY 2 RES 1M OHM 1210, 1210 (3225 Metric), Concave, Long Side Terminals, CryptoAuthentication? View
OSTKH221551 OSTKH221551 On Shore Technology Inc., CONN TERM BLOCK 7.62MM 22POS, -, CryptoAuthentication? View
68405-112 68405-112 Amphenol FCI, BERGSTIK II DR R/A WIDE BODY, -, CryptoAuthentication? View
134752-3 134752-3 TE Connectivity AMP Connectors, CONN BCKSHLL CBL CLAMP 9PS 90DEG, -, CryptoAuthentication? View
MS3476W1419SX MS3476W1419SX Souriau, CONN PLUG 19POS STRAIGHT W/SCKT, -, CryptoAuthentication? View
RSA30DRMD-S273 RSA30DRMD-S273 Sullins Connector Solutions, CONN EDGE DUAL FMALE 60POS 0.125, -, CryptoAuthentication? View
hotISL43210IHZ-T ISL43210IHZ-T Renesas Electronics America, IC SWITCH SPDT SOT23-6, SOT-23-6, CryptoAuthentication? View
Payment Methods
Delivery Services

Quick Inquiry

ATECC108-MAHDA-T

Certified Quality

Heisener's commitment to quality has shaped our processes for sourcing, testing, shipping, and every step in between. This foundation underlies each component we sell.

ISO9001:2015, ICAS, IAF, UKAS

View the Certificates

Do you have any question about ATECC108-MAHDA-T?

+86-755-83210559 ext. 811 SalesDept@heisener.com heisener007 2354944915 Send Message

ATECC108-MAHDA-T Tags

  • ATECC108-MAHDA-T
  • ATECC108-MAHDA-T PDF
  • ATECC108-MAHDA-T datasheet
  • ATECC108-MAHDA-T specification
  • ATECC108-MAHDA-T image
  • Microchip Technology
  • Microchip Technology ATECC108-MAHDA-T
  • buy ATECC108-MAHDA-T
  • ATECC108-MAHDA-T price
  • ATECC108-MAHDA-T distributor
  • ATECC108-MAHDA-T supplier
  • ATECC108-MAHDA-T wholesales

ATECC108-MAHDA-T is Available in