Outsourcing cryptographic operations
IoT device designers may wish to offload some or all cryptographic operations to a secured microcontroller for a number of reasons. The most common driver is a desire to keep some or all crypto keys and operations in a secure environment. The move could also be prompted by a need to increase performance and reduce the load on the main processor. Other triggers include the need for secured random number generation or the bundling of all processing on a security microcontroller, thus eliminating the need for a parallel non-secure processor. A single-processor solution has the added bonus of reduced costs.
Benefits at a glance
- Trust in certified cryptography on IoT devices
- Protection against data theft and abuse for service providers
- Hardware-based cryptography for greater user confidence in the security of their IoT devices
Find an answer to your question
Technical Assistance Center (TAC)
Infineon welcomes your comments and questions.
If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.
You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.