Recently, a perfectly compatible replacement for atecc608a has been found. The name is MOD8ID of modsemi, which is truly P2P replacement. What is touching is that it can be perfectly adapted without changing the original cryptolib library on the host side, or even changing any code and hardware.
ECDSA’s generation key pair signature, signature verification, secureboot, TLS and other interface functions are perfect, and the hardware protection is also in place. Not only that, but also downward compatible with atecc508a/atecc608b series, with national security and other functions. Mod8id supports dfn8 small package and sop8
MOD8ID secure element can replace ATECC608A model is:
ATECC608A-MAHDA-T: UDFN8 package, I2C interface
ATECC608A-MAHDA-S: UDFN8 package, I2C interface
ATECC608A-SSHDA-T: SOP8 package, I2C interface
ATECC608A-SSHDA-B: SOP8 package, I2C interface
Some code examples:
/*[0] init: I2C communication connection and test (use mod8id communication debugging, please refer to ecc_i2c.c for I2C driver transplantation)*/
status = mse_init(&cfg_mod8_i2c);
if (status != MSE_SUCCESS)
{
printf(” mse_init() failed with ret=0x%08d\n”, status);
goto exit;
}
printf(” init OK.\n”);/*[1] load configuration: load the configuration and lock the configuration area (only execute it once, note: it cannot be unlocked after locking)*/
status = app_load_configuration();
if (status != MSE_SUCCESS)
{
printf(” APP – Load configuration failed\n”);
goto exit;
}
printf(” Load configuration OK.\n”);/* [2] Write Slot Data:[1] */
status = app_write_key();
if (status != MSE_SUCCESS)
{
printf(” APP – Write key failed\n”);
goto exit;
}
printf(” Write key OK.\n”);/* [3] Sign_Verify:*/
status = app_sign_verify();
if (status != MSE_SUCCESS)
{
printf(” APP – Sign_Verify failed\n”);
goto exit;
}
printf(” Sign_Verify OK.\n”);/* [4] HMAC: */
status = app_hmac();
if (status != MSE_SUCCESS)
{
printf(” APP – HMAC failed\n”);
goto exit;
}
printf(” HMAC OK.\n”);
-
Key features
Security co-processor with cryptographic algorithm and key storage
High-end security controller
Protected Storage for Keys, Certificates or Data
Hardware Support for Asymmetric Sign,Verify,authentication,Key Agreement:
Hardware cryptographic algorithm processor: SM2, ECC-P256, SHA-256, TRNG
ECDSA: Elliptic Curve Digital Signature
ECDH: Elliptic Curve Diffie-Hellman
SM2: Diffie-Hellman Ephemeral (ECDHE) over the SM2 elliptic curve
Hardware Support for Symmetric Algorithms:
SHA-256 & HMAC
SM4: Block-cipher symmetric algorithm Encrypt/Decrypt
AES-128/256: Encrypt/Decrypt
Networking Key Management Support:
security key generation and key agreement
Communication data encryption with protected
Turnkey PRF/HKDF calculation for TLS
Security update and firmware Support:
High security ECDSA firmware signature validation
Full life cycle secure boot validation
Firmware upgrade protection and data encryption protection
Internal High-Quality NIST Standard Random Number Generator (RNG)
Up to 5kB of user security storage to store extended security information
Unique Serial Number
High-Endurance Monotonic Counters
Interface Options Available400k/1 MHz Standard I2C Interface
Fast and easy integration
DFN8 and SOP8 Packages
For details of MOD8ID , please visit the introduction page: https://www.modsemi.com/shows/7/3.html