AT88SA10HS-TSU-T Atmel, AT88SA10HS-TSU-T Datasheet - Page 15

no-image

AT88SA10HS-TSU-T

Manufacturer Part Number
AT88SA10HS-TSU-T
Description
IC HOST AUTHENTICATION SOT23-3
Manufacturer
Atmel
Series
CryptoAuthentication™r
Type
Authentication Chipr

Specifications of AT88SA10HS-TSU-T

Applications
Networking & Communications
Mounting Type
Surface Mount
Package / Case
SOT-23-3
Operating Supply Voltage
2.5 V to 5.5 V
Maximum Operating Temperature
+ 85 C
Mounting Style
SMD/SMT
Interface Type
1 Wire
Minimum Operating Temperature
- 40 C
Number Of Timers
1
Program Memory Size
72 bit
Program Memory Type
ROM
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Appendix A. Glossary
8663B–SMEM–3/09
Embedded system that performs validation or authentication (host)
Product being protected or authenticated (client)
Symmetric encryption algorithm
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
Joint Test Action Group IEEE 1149.1 (JTAG)
In Circuit Emulator (ICE)
Integrated Development Environment (IDE)
Programming Services
1
2
National Institute of Standards and Technology, Nov 26, 2001.
IEEE Standards Organization, May 12, 2009.
A special-purpose computer system designed to perform one or a few dedicated functions, often with
real-time computing constraints. It is usually embedded as part of a complete device including
hardware and mechanical parts.
A special purpose embedded system that performs limited functionality and is usually does not
perform any actions on its own but is entirely dependent on the host system.
An encryption algorithm where the same key is used for both the encryption and decryption of data.
The key must be kept secret, and is shared by both the message sender and recipient.
A method for encrypting information that was selected by NBS as an official Federal Information
Processing Standard (FIPS) for the United States in 1976. DES is currently recommended for end of
life by NIST
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that
can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can
encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible
form called ciphertext; decrypting the ciphertext converts the data back into its original form, called
plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to
encrypt and decrypt data in blocks of 128 bits.
Standard group formed in 1985 to develop a testability framework. A working group now under the
Computer Society of the IEEE’s Test Technology Technical Committee (TTTC). Has taken the TM
and ETM-Bus specifications of the Department of Defense as a basis for the new set of draft IEEE
standards numbered 1149.x.
The in-circuit emulator (ICE) is commonly adopted as a microprocessor debugging technique. In this
paper, a parameterized embedded in-circuit emulator and its retargetable debugging software are
proposed. The parameterized embedded in-circuit emulator can be integrated into different style
processors such as microcontroller, microprocessor, and DSP processor. The GUI interface
debugging software can help user to debug easily. As a result of it, the duration of microprocessor
debugging design procedure time is reduced.
Software program which allows the use of different individual tools from one single development platform.
A system operated by Atmel to provide a secure method to insert customer’s secrets into devices as
a part of the device manufacturing process.
1
CryptoAuthentication™ Product Uses
2
http://standards.ieee.org
1
http://csrc.nist.gov
15
2

Related parts for AT88SA10HS-TSU-T