NDA. For more information, please
contact your local Microchip sales
office.
ATECC608B
CryptoAuthentication™ Device Summary Data Sheet
Features
• Cryptographic Co-Processor with Secure Hardware-Based Key Storage:
– Protected storage for up to 16 keys, certificates or data
• Hardware Support for Asymmetric Sign, Verify, Key Agreement:
– ECDSA: FIPS186-3 Elliptic Curve Digital Signature
– ECDH: FIPS SP800-56A Elliptic Curve Diffie-Hellman
– NIST Standard P256 Elliptic Curve Support
• Hardware Support for Symmetric Algorithms:
– SHA-256 & HMAC Hash including off-chip context save/restore
– AES-128: Encrypt/Decrypt, Galois Field Multiply for GCM
• Networking Key Management Support:
– Turnkey PRF/HKDF calculation for TLS 1.2 & 1.3
– Ephemeral key generation and key agreement in SRAM
– Small message encryption with keys entirely protected
• Secure Boot Support:
– Full ECDSA code signature validation, optional stored digest/signature
– Optional communication key disablement prior to secure boot
– Encryption/Authentication for messages to prevent on-board attacks
• Internal High-Quality NIST SP 800-90A/B/C Random Number Generator (RNG)
• Two High-Endurance Monotonic Counters
• Unique 72-Bit Serial Number
• Two Interface Options Available:
– High-Speed Single Wire Interface with One GPIO Pin
– 1 MHz Standard I2C Interface
• 1.8V to 5.5V IO Levels, 2.0V to 5.5V Supply Voltage
• Two Temperature Ranges Available:
– Standard Industrial Temperature Range: -40℃ to +85℃
– Extended Industrial Temperature Range: -40℃ to +100℃
• <150 nA Sleep Current
• Packaging Options
– 8-pad UDFN, 8-lead SOIC and 3-Lead Contact Package Options
– Die-on-Tape and Reel and WLCSP for Qualified Customers (Contact Microchip Sales)
The Microchip Website.................................................................................................................................24
The ATECC608B is a member of the Microchip CryptoAuthentication™ family of high-security cryptographic devices,
which combine world-class, hardware-based key storage with hardware cryptographic accelerators to implement
various authentication and encryption protocols.
The ATECC608B provides security enhancements over that of the ATECC608A, while providing complete backwards
compatibility. All configuration settings, commands, packages and functionality of the ATECC608A are still available
in the ATECC608B, making migration from the ATECC608A a simple process. For new designs, it is recommended
that customers start directly with the ATECC608B device. For designs that are being upgraded and currently use the
ATECC508A or the ATECC608A, it is recommended that they move to the ATECC608B. For designs not planned to
be upgraded, it is recommended that customers review their designs to see if they would benefit from the enhanced
security of the ATECC608B. For assistance with migrating a design to the ATECC608B, see the Migrations
References section.
For more information on compatibility with other Microchip CryptoAuthentication products, please see Section 3.
Compatibility.
Migration References:
1.AN3539: Provides guidance on migrating from the ATECC508A to the ATECC608B
2.AN2237: Provides guidance on migrating from the ATECC608A to the ATECC608B
ATECC608B
Introduction
1.1 Applications
The ATECC608B has a flexible command set that allows use in many applications, including the following:
• Network/IoT Node Endpoint Security
Manages node identity authentication and session key creation and management. Supports the entire
ephemeral session key-generation flow for multiple protocols, including TLS 1.2 (and earlier) and TLS 1.3.
• Secure Boot
Supports the MCU host by validating code digests and optionally enabling communication keys on success.
Various configurations to offer enhanced performance are available.
• Small Message Encryption
Contains a hardware AES engine to encrypt and/or decrypt small messages or data such as PII information.
Supports the AES-ECB mode directly. Other modes can be implemented with the help of the host
microcontroller. There is an additional GFM calculation function to support AES-GCM.
• Key Generation for Software Download
Supports local protected key generation for downloaded images. Both broadcast of one image to many systems,
each with the same decryption key, or point-to-point download of unique images per system are supported.
• Ecosystem Control and Anti-Counterfeiting
Validates that a system or component is authentic and came from the OEM shown on the nameplate.
1.2 Device Features
The ATECC608B includes an EEPROM array which can be used for storage of up to 16 keys, certificates,
miscellaneous read/write, read-only or secret data, consumption logging and security configurations. Access to the
various sections of memory can be restricted in a variety of ways and then the configuration can be locked to prevent
changes.
Access to the device is made through a standard I2C Interface at speeds of up to 1 Mbps. The interface is compatible
with standard Serial EEPROM I2C interface specifications. The device also supports a Single-Wire Interface (SWI),
which can reduce the number of GPIOs required on the system processor, and/or reduce the number of pins on
connectors. If the Single-Wire Interface is enabled, the remaining pin is available for use as a GPIO, an authenticated
output or tamper input.
Each ATECC608B ships with an ensured unique 72-bit serial number. Using the cryptographic protocols supported
by the device, a host system or remote server can verify a signature of the serial number to prove that the serial
number is authentic and not a copy. Serial numbers are often stored in a standard Serial EEPROM; however, these
can be easily copied with no way for the host to know if the serial number is authentic or if it is a clone.
The ATECC608B features a wide array of defense mechanisms specifically designed to prevent physical attacks on
the device itself, or logical attacks on the data transmitted between the device and the system. Hardware restrictions
on the ways in which keys are used or generated provide further defense against certain styles of attack.
1.3 Cryptographic Operation
The ATECC608B implements a complete asymmetric (public/private) key cryptographic signature solution based
upon Elliptic Curve Cryptography and the ECDSA signature protocol. The device features hardware acceleration for
the NIST standard P256 prime curve and supports the complete key life cycle from high quality private key
generation, to ECDSA signature generation, ECDH key agreement and ECDSA public key signature verification.
The hardware accelerator can implement such asymmetric cryptographic operations from ten to one-thousand times
faster than software running on standard microprocessors, without the usual high risk of key exposure that is
endemic to standard microprocessors.
The ATECC608B also implements AES-128, SHA256 and multiple SHA derivatives such as HMAC(SHA), PRF (the
key derivation function in TLS) and HKDF in hardware. Support is included for the Galois Field Multiply (aka Ghash)
to facilitate GCM encryption/decryption/authentication.
The device is designed to securely store multiple private keys along with their associated public keys and certificates.
The signature verification command can use any stored or an external ECC public key. Public keys stored within the
device can be configured to require validation via a certificate chain to speed up subsequent device authentications.
Random private key generation is supported internally within the device to ensure that the private key can never be
known outside of the device. The public key corresponding to a stored private key is always returned when the key is
generated and it may optionally be computed at a later time.
The ATECC608B can generate high-quality random numbers using its internal random number generator. This
sophisticated function includes runtime health testing designed to ensure that the values generated from the internal
noise source contain sufficient entropy at the time of use. The random number generator is designed to meet the
requirements documented in the NIST 800-90A, 800-90B and 800-90C documents.
These random numbers can be employed for any purpose, including as part of the device’s cryptographic protocols.
Because each random number is ensured to be essentially unique from all numbers ever generated on this or any
other device, their inclusion in the protocol calculation ensures that replay attacks (i.e., re-transmitting a previously
successful transaction) will always fail.
The ATECC608B also supports a standard hash-based challenge-response protocol to allow its use across a wide
variety of additional applications. In its most basic instantiation, the system sends a challenge to the device, which
combines that challenge with a secret key via the MAC command and then sends the response back to the system.
The device uses a SHA-256 cryptographic hash algorithm to make that combination so that an observer on the bus
cannot derive the value of the secret key. At the same time, the recipient can verify that the response is correct by
performing the same calculation with a stored copy of the secret on the recipient’s system. There are a wide variety
of variations possible on this symmetric challenge/response theme.
Voltage on any pin -0.5V to (VCC + 0.5V)-0.5V to (VCC + 0.5V)
ESD Ratings:
Human Body Model(HBM) ESD>4kV
Charge Device Model(CDM) ESD>1kV
Note: Stresses beyond those listed under “Absolute Maximum Ratings” may cause permanent damage to the
device. This is a stress rating only and functional operation of the device at these or any other conditions beyond
those indicated in the operational sections of this specification are not implied. Exposure to absolute maximum rating
conditions for extended periods may affect device reliability.
ATECC608B
Electrical Characteristics
2.2 Reliability
The ATECC608B is fabricated with Microchip’s high reliability CMOS EEPROM manufacturing technology.
Table 2-1. EEPROM Reliability
ParameterMin.Typ.Max.Units
Write Endurance at +85°C (Each Byte)400,000——Write Cycles
To Crypto Device93——µs After ATECC608B transmits the last bit
4.6068.60µs—
4.6068.60µs—
4.6068.60µs—
TIMEOUT
ATECC608B may enter Sleep mode.
415478µs —
6496131µsATECC608B will initiate the first low
going transition after this time interval
following the initial falling edge of the
start pulse of the last bit of the transmit
flag.
of a group, the system must wait this
interval before sending the first bit of a
flag. It is measured from the falling
edge of the start pulse of the last bit
transmitted by ATECC608B.
,
IO Timeout
t
TIMEOUT
To Crypto Device456585ms ATECC608B may transition to the
Sleep mode if the bus is inactive
longer than this duration.
Note:
1.t
START
, t
, t
ZLO
ZHI
and t
are designed to be compatible with a standard UART running at 230.4 kBaud for both
BIT
transmit and receive. The UART must be set to seven data bits, no parity and one Stop bit.