Embedded Security
searchIcon
banner background image

Embedded Security

Embedded security technologies provide robust protection from malicious threats and attacks by creating a multi-layered defense mechanism. Analog Devices, Inc. (ADI)’s embedded security solutions help to ensure the integrity of your entire system and elevate your security posture.

ADI’s tamper-proof security solutions protect your sensitive data and encryption keys and safeguard your intellectual property (IP) and research and development investments from cloning and unauthorized use.

Our secure authentication ICs provide embedded security via hardware-based turnkey solutions for IP protection, credentials storage, IoT node root of trust, and secure communications, all the way to the edge. Our secure microcontrollers leverage built-in FIPS-certified hardware cryptographic engines that support industry-standard algorithms. Security manager products work with your microcontroller to protect information.
Embedded security technologies provide robust protection from malicious threats and attacks by creating a multi-layered defense mechanism. Analog Devices, Inc. (ADI)’s embedded security solutions help to ensure the integrity of your entire system and elevate your security posture.

ADI’s tamper-proof security solutions protect your sensitive data and encryption keys and safeguard your intellectual property (IP) and research and development investments from cloning and unauthorized use.

Our secure authentication ICs provide embedded security via hardware-based turnkey solutions for IP protection, credentials storage, IoT node root of trust, and secure communications, all the way to the edge. Our secure microcontrollers leverage built-in FIPS-certified hardware cryptographic engines that support industry-standard algorithms. Security manager products work with your microcontroller to protect information.

Subcategories

archive icon
The 1-Wire® bus is a simple signaling scheme that performs half-duplex bidirectional communications between a host/main controller and one or more nodes sharing a common data line. Both power and data communications are transmitted over this single 1-Wire line. For power delivery, nodes capture charge on an internal capacitor when the line is in a high state and then use this charge for device operation when the line is low during data transmission. This unique communication scheme allows you to add memory, authentication, and mixed-signal functions at any time, easily and efficiently.
archive icon
DeepCover® secure NFC/RFID transponders (tags) and transceivers (readers) employ a bidirectional security model to enable the most secure contactless communication possible. Our RFID transceiver IC includes a Secure Hash Algorithm-256 (SHA-256) secure authenticator coprocessor based on the FIPS 180-4 standard. When paired with our NFC transponder ICs, the bidirectional security model enforces two-way authentication. Each NFC tag includes a unique 64-bit ROM ID and UID that serves as an electronic serial number within the application. Our secure NFC tags and RFID readers empower new industrial and medical applications, such as node-device secure authentication, automated device configuration, usage limit setting, and sensor-tag implementation.
archive icon
Embedded Security Solutions Extend Security to the Edge

Analog Devices’ secure authenticators provide solutions scaling from the simple authentication and use management of high value peripherals or accessories, to the trusted operation and secure communication of connected devices.

Secure authenticators provide robust hardware-based key storage and cryptographic algorithms highly resistant to hacking that support easy to use, fixed functions enabling the various security objectives. Our ChipDNA® PUF technology is integrated into select products and delivers advanced protection against attacks. A variety of communication interfaces, a reduced footprint, and software enable easy integration into embedded systems.
archive icon
Our secure microcontrollers provide ongoing protection for your digital assets and intellectual property (IP) against continuously emerging threats. Our secure MCU ICs employ FIPS-certified, hardware cryptographic engines, which support industry-standard algorithms. Advanced cryptography, combined with physical layer security, means that when you select a secure microcontroller from our diverse offering, you are guaranteed the highest level of protection against side-channel attacks, physical tampering, and reverse engineering. Other notable features of our secure microcontrollers include integrated secure memory (NV SRAM) that is instantly erased when an intrusion is detected, patented real-time code and data encryption that fully protects external memory, hardware that conforms to EMV, PCI, and FIPS standards, and secure boot and ChipDNA® PUF technology that protect IoT designs against hacker attacks.
archive icon
Security manager ICs keep the most critical information secured permanently with on-chip physical tamper protection.

You Can’t Steal a Key that Isn’t There

ChipDNA provides unprecedented protection against cyberattacks by deriving a cryptographic key from a precise analog characteristic of the IC. This key is based on a physically unclonable function and is not stored in memory or any other static state where it could be compromised.
campaign-image
campaign-image

You Can’t Steal a Key that Isn’t There

ChipDNA provides unprecedented protection against cyberattacks by deriving a cryptographic key from a precise analog characteristic of the IC. This key is based on a physically unclonable function and is not stored in memory or any other static state where it could be compromised.