4.4 Confidentiality
Cryptographic countermeasures might be necessary to ensure that a product and its application code is not cloned, counterfeited or tampered with. Implementing CryptoAuthentication™ in the bootloader will ensure only legitimate code can be transferred between host and device.
For more information, visit the Microchip CryptoAuthentication™ Site.