The AT90SO72 is based on Inside’s low-power 8/16-bit enhanced RISC CPU and is Common Criteria EAL4+ ready. It features a hardware random number generator, hardware AES (128-, 192- and 256-bit key supported), DES and triple DES. The MCU includes Inside’s Ad-X 2 advanced hardware crypto accelerator, which supports RSA up to 4096 bits, DSA, Diffie-Hellman and all FIPS-recommended elliptic curves up to 1024 bits. Key generation also is supported for both RSA and ECC.
The RoHS-compliant chip includes 288K bytes of ROM and 72K bytes of high-density EEPROM, which can be mapped as part of the program memory to provide a highly flexible and cost-effective solution for many applications. A USB 2.0 interface supports both full-speed and cost-effective low-speed modes. Both modes are available in configurations with no external resonator thus reducing the bill of material. This USB interface supports six software configurable data transfer endpoints with in-or-out directions for bulk, interrupt or isochronous transfers.
The flexible I/O options also include a master/slave SPI controller, an I2C (two-wire) controller, up to seven GPIO lines and an ISO 7816 interface. The AT90SO72 also includes a built-in variable frequency oscillator to reduce system cost and size and to increase security. A variety of dedicated anti-tampering hardware is included for protection against simple and differential power analysis (SPA/DPA) attacks, advanced protection against physical attacks (including active shield, enhanced protection object, C stack checker, slope detector and parity errors), environmental protection systems (voltage, frequency and temperature monitors), light protection and secure memory management/access protection. The AT90SO72 is available in wafers, modules and standard SOIC-8 (5x5mm) and QFN-20 (4x4mm) packages.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.