Zenode.ai Logo
Beta
8-SOIC
Integrated Circuits (ICs)

ATECC608B-TNGACTS-C

Active
Microchip Technology

PRE-PROVISIONED FOR ACTILITY LORA JOIN SERVER

8-SOIC
Integrated Circuits (ICs)

ATECC608B-TNGACTS-C

Active
Microchip Technology

PRE-PROVISIONED FOR ACTILITY LORA JOIN SERVER

Technical Specifications

Parameters and characteristics for this part

SpecificationATECC608B-TNGACTS-C
Mounting TypeSurface Mount
Package / Case8-SOIC
Package / Case [x]0.154 in
Package / Case [y]3.9 mm
Supplier Device Package8-SOIC
TypeAuthentication Chip

Pricing

Prices provided here are for design reference only. For realtime values and availability, please visit the distributors directly

DistributorPackageQuantity$
Microchip DirectT/R 1$ 1.26

Description

General part information

ATECC608B-TNGLORA Series

Recommend using the [ATECC608B](https://www.microchip.com/en-us/product/atecc608b).

The Microchip ATECC608A integrates ECDH (Elliptic Curve Diffie Hellman) security protocol an ultra-secure method to provide key agreement for encryption/decryption, along with ECDSA (Elliptic Curve Digital Signature Algorithm) sign-verify authentication for the Internet of Things (IoT) market including home automation, industrial networking, medical, as well as accessories and consumables authentication and more. In addition, the ATECC608A offer an integrated AES hardware accelerator strengthening hardware based security for LoRaWAN applications and enable secure boot capabilities for very small microcontrollers.

The ATECC608A is a secure element from the Microchip CryptoAuthenticationTM portfolio with advanced Elliptic Curve Cryptography (ECC) capabilities. With ECDH and ECDSA being built right in, this device is ideal for the rapidly growing IoT market by easily supplying the full range of security such as confidentiality, data integrity, and authentication to systems with MCU or MPUs running encryption/decryption algorithms. Similar to all Microchip CryptoAuthentication products, the new ATECC608A employs ultra-secure hardware-based cryptographic key storage and cryptographic countermeasures which eliminate potential backdoors linked to software weaknesses.