Outsourcing cryptographic operations
IoT device designers may wish to offload some or all cryptographic operations to a secured microcontroller for a number of reasons. The most common driver is a desire to keep some or all crypto keys and operations in a secure environment. The move could also be prompted by a need to increase performance and reduce the load on the main processor. Other triggers include the need for secured random number generation or the bundling of all processing on a security microcontroller, thus eliminating the need for a parallel non-secure processor. A single-processor solution has the added bonus of reduced costs.
Benefits at a glance
- Trust in certified cryptography on IoT devices
- Protection against data theft and abuse for service providers
- Hardware-based cryptography for greater user confidence in the security of their IoT devices
Videos: IoT security demonstrations
Experience our broad range of demonstrations including the embedded security solutions of our OPTIGA™ product family