Infineon OPTIGA™ Trust Family

Authentication & device security

The OPTIGA™ Trust family of products consists of turn-key and programmable solutions that give you the benefit of easy and convenient integration whilst offering you the most suitable security to protect your business and product. It contains a full range of embedded security products addressing the device authentication market which enables the right features and the right level of security for your projects such as the protection of embedded systems against counterfeiting, unauthorized products, intentional attacks, and unintentional operator errors.

Infineon OPTIGA components hovering above a city

Trust X

As embedded systems (e.g. IoT devices) are increasingly gaining the attention of attackers, Infineon offers the OPTIGA™ Trust X as a turnkey security solution for industrial automation systems, smart homes, consumer devices and medical devices. Utilizing the Public Key Infrastructure, this high-end security controller comes with full system integration support for easy and cost-effective deployment of high-end security for your assets.

The OPTIGA™ Trust X is based on an advanced security controller with built-in tamper proof NVM for secure storage with Symmetric/Asymmetric crypto engine to support ECC 256, AES-128 and SHA-256.

The OPTIGA™ Trust X covers a broad range of use cases necessary for many types of applications.

  • Network node protection such as TLS or DTLS
  • Protect the Authenticity, Integrity and Confidentiality of your product, data and IP
  • Mutual Authentication
  • Secure Communication
  • Data store Protection
  • Lifecycle Management
  • Platform Integrity Protection
  • Secure Updates


OPTIGA™ Trust X    —   SLS32AIA020X


  • High-end security controller
  • Turnkey solution
  • One-way authentication using ECDSA
  • Mutual authentication using DTLS client (IETF standard RFC 6347)
  • Secure communication using DTLS
  • Compliant with the USB Type-C™ Authentication standard
  • I2C interface
  • Up to 10KB user memory
  • Cryptographic support: ECC256, AES128, SHA-256, TRNG, DRNG
  • PG-USON-10-2 package (3x3mm)
  • Standard & extended temperature ranges
  • Full system integration support
  • Common Criteria Certified EAL6+ (high) hardware
  • Cryptographic Tool Box based on ECC NIST P256, P384 and SHA256 (sign, verify, key generation, ECDH, session key derivation)


  • Industrial control and automation
  • Consumer electronics
  • Smart home
  • Medical devices



IoT security brochure

Download IoT Security Brochure