AT88SA10HS-TSU-T Atmel, AT88SA10HS-TSU-T Datasheet - Page 8

no-image

AT88SA10HS-TSU-T

Manufacturer Part Number
AT88SA10HS-TSU-T
Description
IC HOST AUTHENTICATION SOT23-3
Manufacturer
Atmel
Series
CryptoAuthentication™r
Type
Authentication Chipr

Specifications of AT88SA10HS-TSU-T

Applications
Networking & Communications
Mounting Type
Surface Mount
Package / Case
SOT-23-3
Operating Supply Voltage
2.5 V to 5.5 V
Maximum Operating Temperature
+ 85 C
Mounting Style
SMD/SMT
Interface Type
1 Wire
Minimum Operating Temperature
- 40 C
Number Of Timers
1
Program Memory Size
72 bit
Program Memory Type
ROM
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
11.
8
Securing Wireless or Other Radio Transmission Nodes
Radio transmission devices have to verify each node prior to allowing access to the network. The AT88SA102S is a
great option for offering a low cost verification method. By installing AT88SA102S CryptoAuthentication devices in the
radio nodes (client), the transmitting node (host) can verify that it is communicating with valid network nodes before
transmitting important commands or information. Additional security can be achieved by adding an AT88SA10HS
device in the host, so that the customer secrets would not have to be kept in the microprocessor code where
developers and subcontractors may have access to them. Figure 7 shows a configuration that utilizes the
AT88SA10HS/102S in a radio node network.
Figure 7.
Wireless networks may need to transmit encrypted data between each node in order to prevent “man in the middle”
and eavesdropping attacks. The AT88SA102S CryptoAuthentication can be used to facilitate encrypted
communications between wireless nodes. To accomplish this would require placing AT88SA102S devices both sending
and receiving nodes This would be done by sending a random challenge to the AT88SA102S device in the transmitting
node and using the response as a symmetric encryption key to encrypt the transmitted data prior to transmitting. The
transmitting node would send the random challenge along with the encrypted data packet. In the receiving node an
AT88SA102S device with the same key would send the random challenge to its device and use the response
generated by the device as a decryption key.
The AT88SA102S device could also be used to authenticate the transmission as the packet could be hashed and the
hash sent along with the transmission. The receiving node would then hash the packet and verify that the hash created
was the same as the transmitted hash, which would verify the authenticity of the transmission.
CryptoAuthentication™ Product Uses
Wireless Node Authentication
8663B–SMEM–3/09

Related parts for AT88SA10HS-TSU-T