Infineon's OPTIGA™ Product Family

Hardware-based Security Solutions for Embedded Applications

Rising Concerns about Embedded Security

Embedded systems are becoming ubiquitous. Due to trends such as the Internet of Things (IoT) and machine-to-machine communication (M2M) the number of connected devices and machines are increasing. Many of these - from small household appliances through large communication networks to complex, industrial automation systems - are controlled by special-purpose, embedded computing systems.

While this networking trend continues to gather pace - promising greater convenience and comfort for users and new business and service models for companies - security in this embedded world often lags far behind. Security vulnerabilities are rising dramatically as the attack surface widens and manufacturers struggle to protect sensitive data, IP and process integrity.

Meeting Today’s Security Challenges with OPTIGA™

Our OPTIGA™ family of security solutions is designed for easy integration into embedded systems. These hardware-based security solutions scale from basic authentication functionality to advanced implementations meeting your individual and changing needs, while maximizing the return on your investment.

Both our OPTIGA™ Trust and OPTIGA™ TPM product families provide proven and reliable embedded security performance.


We understand that security needs are as varied as they are complex. Scaling from basic, single-function authentication solutions to robust certified security controllers for advanced platform integrity checks, we have developed the market's widest portfolio to support individual security needs across a broad market spectrum.

OPTIGA™ TPM in Networking Applications


As an entry point to corporate, home or industrial networks, routers and gateways are especially vulnerable to outside attacks. A failure to protect these entry points can result in the loss of confidential information as well as interrupted operations.


Equipped with an OPTIGA™ TPM the network equipment enables the uninterrupted operation of the system as well as protecting sensitive information by relying on the standardized, certified OPTIGA™ TPM solutions. It can do so by performing integrity checks, securely managing the equipment remotely as well as supporting the encryption of information transferred through and stored in the router or gateway. With its extensive functionality it allows to satisfy both basic security needs as well as fulfilling complex requirements as your needs evolve.

OPTIGA™Trust E in Industrial Applications


Industrial automation, medical equipment, electronic components - plagiarism of capital equipment and consumer products endangers both, user experience and safety as well as companies business models and investments. According to the OECD, counterfeiting and piracy costs add up to around 638 billion US dollars annually.


The new OPTIGA™ Trust E offers an easily implementable solution to protect manufacturers' valuable IP from being attacked, analyzed, copied and modified. Enhanced authentication as well as secured storage of software codes and product data improve network and supply chain management - particularly in the context of Industry 4.0. And help manufacturers of high value goods to safeguard their IP and protect their brand through assured quality and safety of their products.


Ease of Integration paired with Tailored Authentication Performance

Our OPTIGA™ Trust family of turnkey, programmable solutions gives you the benefit of easy and convenient integration whilst offering you the most suitable security level to protect your business model, process know-how and IP.

You can rely on OPTIGA™ Trust products to protect your embedded systems against counterfeiting, unauthorized products, intentional attacks and unintentional operator errors.

Basic Authentication Solution for your Embedded Application

OPTIGA™ Trust B SLE95250 is a robust cryptographic solution for embedded systems requiring easy-to-integrate, reliable authentication features. This security solution is designed to help system and device manufacturers safeguard the authenticity, integrity and safety of their original products.

As a turnkey solution, it provides enhanced protection against aftermarket counterfeit replacements and unauthorized re-use or re-provisioning of original parts - thus helping to maintain OEM authenticity and safeguard the user experience.

Key Features

  • Strong cost efficient asymmetric cryptography with ECC 131bit key length
  • OPTIGA™ Digital Certificate (ODC) with device personalization (unique key pair per chip)
  • Turnkey solution including host-side software for easy integration
  • 512bit user NVM
  • Easy-to-implement single-wire host interface
  • Size-optimized TSNP-6-9 package (1.1 x 1.5 mm)

Key Benefits

  • Lower system costs due to single-chip solution
  • Increased security with asymmetric cryptography and chip-individual keys
  • Easy integration thanks to full turnkey design and very small form factor


  • Battery authentication
  • IoT edge devices
  • Consumer accessories
  • IP & PCB design protection
  • Original replacement parts
  • Medical & diagnostic supply equipment

Easy, cost-effective Security Solution for high-value Goods

OPTIGA™ Trust E is a high-end turnkey security controller with full system integration support for easy and cost-effective deployment. It supports a broad range of uses cases focused on the protection of services, business models and user experience. One-way authentication mechanisms uniquely identify objects and protect PKI networks.

Key Features

  • High-end security controller with an advanced cryptographic algorithm implemented in hardware (ECC256)
  • Turnkey solution with OS, Applet and complete host-side integration support
  • I2C interface and PG-USON-10 package (3 x 3 mm)
  • Up to 3 Kbytes user memory
  • Standard & extended temperature range -40° to +85°C
  • Compliant to USB Type-C standard

Key Benefits

  • Reduced design-in and integration effort
  • Protection of IP and data
  • Protection of business models & company image
  • Safeguarding of quality and safety


  • Embedded systems networked over the IOT
  • Industrial control and automation
  • Medical devices & Consumer electronics
  • Smart homes
  • PKI networks

Programmable Trust Anchor for Embedded Systems

OPTIGA™ Trust P (SLJ 52ACA) is a high-security, feature-rich solution. As a fully programmable chip, it is a highly flexible and secured solution supporting the full range of functions from authentication and secured updates through key generation and access control. This hardware security microcontroller provides advanced and efficient protection against side-channel, fault-induction, and physical attacks.

Key Features

  • High-end security controller with advanced cryptographic algorithms implemented in hardware (ECC521, RSA2k, DES. AES)
  • Common Criteria EAL 5+ (high) certification
  • Programmable JavaCard operating system with reference applets for a variety of use cases and host-side support
  • 150KB user memory
  • Small footprint VQFN32 SMD package (5 x 5 mm)

Key Benefits

  • Secured and certified solution
  • Increased flexibility based on programmable solution with reference applets to simplify customization and integration
  • Protection of system integrity, communication and data


  • Industrial control systems
  • Energy generation and distribution systems
  • Healthcare equipment and networks
  • Consumer electronics
  • Home security and automation
  • Embedded systems networked over the IOT

Infineon’s Hardware based Security Solution optimized to address IoT Device’s Requirements

Intellectual property theft, stolen personal information, interruption of operations compromising the business continuity, and even endangering a company’s brand image and thus its existence: 

The OPTIGA™ Trust X is Infineon’s response to those threats. It is a hardware based security solution optimized to address IoT device’s requirements: premium security, high performance, easy to integrate, supporting non-rich operating systems, low power consumption, and small packages. The product covers a broad range of use cases: authentication, secure communication, data store protection, key provisioning, life-cycle management, power management, secure updates, and also platform integrity protection.

Key Features

  • High-end security controller
  • Turnkey solution
  • One-way authentication using ECDSA
  • Mutual authentication using DTLS client (IETF standard RFC 6347)
  • Secure communication using DTLS
  • Compliant with the USB Type-C™ Authentication standard
  • I2C interface
  • Up to 10kB user memory
  • Cryptographic support: ECC256, AES128, SHA-256, TRNG, DRNG
  • PG-USON-10-2 package (3 x 3mm)
  • Standard & extended temperature ranges
  • Full system integration support
  • Common Criteria Certified EAL6+ (high) hardware
  • Cryptographic Tool Box based on ECC NIST P256, P384 and SHA256 (sign, verify, key generation, ECDH, session key derivation)

Key Benefits

  • Enhanced security for connected devices
  • Easy integration
  • Cost-effective deployment
  • Enabling new features and business models


  • Smart IoT
  • Industrial control and automation
  • Consumer electronics
  • Smart home
  • Medical devices


Protecting Integrity and Authenticity of Embedded Devices and Systems

OPTIGA™ TPM (Trusted Platform Module) offers a broad portfolio of standardized security controllers with secured key store and the support for a variety of encryption algorithms.

Certified Security Solutions for Computing and Emerging IoT Applications

OPTIGA™ TPM (Trusted Platform Module) is a standardized security controller which protects the integrity and authenticity of devices and systems in embedded networks. Built
on proven technologies and supporting TPM 1.2 and the latest TPM 2.0 standard, OPTIGA™ TPM highlights include secured storage for keys, certificates and passwords as well as dedicated key management. As the established, trusted market and innovation leader in the Trusted Computing space, we offer a broad portfolio of certified OPTIGA™ TPM) security controllers based on the Trusted Computing Group (TCG) standard to suit all needs.

Key Features

  • High-end security controller with advanced cryptographic algorithms implemented in hardware (e.g. RSA & ECC256, SHA-256)
  • Common Criteria (EAL4+) and FIPS security certification
  • Flexible integration with SPI, I2C and LPC interface support
  • Extended temperature range (-40 to +85°C) for a variety of applications

Key Benefits

  • Reduced risk based on proven technology
  • Fast time to market through concept reuse
  • Flexibility thanks to wide range of security functions as well as dedicated key management
  • Easy integration into all platform architectures and operating systems


  • PC and embedded computing
  • Network equipment
  • Industrial control systems
  • Home security and automation
  • Energy generation and distribution systems
  • Automotive electronics

Evaluation Boards

Get started with OPTIGA™ Trust B with the demo kit. The kit includes a host MCU and an OPTIGA™ Trust B SLE95250. It has a JTAG interface as well as an I/O Extension Card with an additional SLE95250.

The demo kit comes with a user manual, and a graphical user interface for evaluation purposes. It also includes a Dave IDE as well as a HiTop Debugger. All in all a this is a full scale demo kit to get you started.

The OPTIGA™ Trust E evaluation kit based on an Infineon XMC4500 showcases all OPTIGA™ Trust E use cases making it easy for you to get started with this product.

With an easy PC plug-in and a PC user interface it allows you a quick start for evaluating the OPTIGA™ Trust E.

Learn more about the OPTIGA™ Trust P with the demo kit. It gets you started by demonstrating the functionalities of the OPTIGA™ Trust P and is expandable to a full development kit with a software download from an Infineon Secure Site.

The kit includes both the host controller board as well as connection cables, demo utility software (for the PC) and a demo system user guide.

The OPTIGA™ Trust X evaluation and demonstration kit is a quick and easy way of getting started with IoT security. The OPTIGA™ Trust X is an authentication device mainly used for IP protection of accessories and spare parts. As a full turnkey solution it comes with a high-end security controller, operating system as well as a library for the main system host controller. The PC plug in board is based on a XMC4500 microcontroller and comes with software providing the user an intuitive graphical user interface. This allows users to try out the applications of the OPTIGA™ Trust X such as a one way authentication, insertion of cryptographic certificates as well as reading and writing data.

Summary of Features:

  • XMC4500 relax kit with extension board incl. OPTIGA™ Trust X
  • Easy to use GUI for demo purpose
  • Intuitive getting started guide with step by step descriptions
  • Incl. all required cables, software and documentation
  • OPTIGA™ Trust X pins accessible for connecting with your own host board


The OPTIGA™ Trust X evaluation and demonstration kit serves to demonstrate the OPTIGA™ Trust X (SLS 32AIA) functionalities and typical applications such as a one way authentication for counterfeit protection.

Get started for your embedded system with the OPTIGA™ TPM evaluation board today.

The IRIDIUM plug-in board can be used to evaluate the OPTIGA™ TPM for both a Raspberry Pi and Beagle Board. It comes with an extensive application note enhanced by the publicly available Linux setup and drivers, software stacks and so on. Everything you need to get started with TPM for your application is available - start securing your application today.

For further use cases, there are also Xenon evaluation boards available for all of the OPTIGA™ TPM products that allow you to easily test and evaluate the TPM functionalities.

Securing Communication in the Internet of Things

OPTIGA™ TPM Application Notes

Infineon OPTIGA™ TPM SLB 9645 with Embedded Platform

Infineon OPTIGA™ TPM SLB 9645 / SLB 9670 TPM 1.2 with Embedded Platform Integration on a Raspberry Pi® 2


Join our Webinar and Discover the Benefits of Dedicated Hardware-based Security

Embedded devices are increasingly connected and as part of this connectivity increasingly at risk to be manipulated or attacked. Attackers can gain access to valuable information such as IP and customer data or can manipulate the system or even introduce counterfeit devices.

To prevent this, strong embedded security measures are needed. Attendees will learn the fundamentals of how embedded systems are at risk and what can be done to protect them.

Key Take-Aways

  • Learn the fundamentals of how embedded systems in Internet-of-things or industrial applications can be secured
  • Understand the benefits of dedicated hardware security in your system
  • Find out which type of security functions you need to protect your system and supply chain
  • Learn about Infineon Technologies security solutions and the OPTIGA™ family of security controllers

Watch our free of charge webinar: Security for the IoT – Do You Know How to Secure Your Embedded System?