AT88SC1616C CryptoMemory Smart Card

The AT88SC1616C, a member of the CryptoMemory family is an secure memory solution that offers 16 Kbits of user memory. It comes with security features and built in cryptography capabilities. The user memory is divided into 16 zones allowing for security access rights to be set individually or combined to accommodate 1, to 16 data files. With its level of security, cost effectiveness and ease of implementation the AT88SC1616C is well suited for smart card applications without the need for a microprocessor operating system.

One of its features is the embedded engine that enables dynamic symmetric mutual authentication between the device and host. It also performs stream encryption for all exchanged data and passwords between them. Up to four unique key sets can be utilized for these operations.

The AT88SC1616C supports communication with any card reader using the asynchronous T = 0 protocol specified in ISO 7816 3. Additionally it can communicate using a two wire protocol at clock speeds up to 2 MHz making it compatible with systems or applications where the device is used on a circuit board. In this communication mode up to 15 devices can be. Individually addressed on the serial data bus. The two wire protocol can also be used for personalization of the device, in card form.

AT88SC0104C Smart Card
Feature Description
Device Family One of a Family of Devices with User Memories from 1-Kbit to 1-Mbit
EEPROM User Memory 16-Kbit
– Sixteen 128 x 8 (1-Kbit) Zones
– Self-timed Write Cycle (5 ms)
– Single Byte or 16-byte Page Write Mode
– Programmable Access Rights for Each Zone
Configuration Zone 2-Kbit
– 37-byte OTP Area for User-defined Codes
– 160-byte Area for User-defined Keys and Passwords
Operating Voltage Low Voltage Operation: 2.7V to 5.5V
Protocol Dual Protocol
– ISO 7816-3 Asynchronous T = 0 Protocol
– Synchronous Two-wire Protocol
High Security Features – 64-bit Patented Dynamic Symmetric Mutual Authentication Protocol (under exclusive patent license from ELVA)
– Encrypted Checksum
– Stream Encryption
– Four Key Sets for Authentication and Encryption
– Eight Sets of Two 24-bit Passwords
– Anti-tearing Function
– Voltage and Frequency Monitor