回到顶部

Deep Cover Automotive 1-Wire Authenticator

Ensure Vehicle Safety and Reliability by Authenticating Automotive Components

产品详情

主要特征

应用/用途

Parametric specs for Secure Authenticators
Applications Automotive Secure Authentication
Secure Authentication of Accessories and Peripherals
Secure Boot or Download
Bus Type 1-Wire
Memory Type OTP
Memory Size 6 Kb
Deep Cover Yes
Package/Pins TDFN/10
Budgetary
Price (See Notes)
1.15
Parametric specs for 1-Wire Interface Products
Functions Authentication
VSUPPLY (V) 2.97 to 3.63
Package/Pins TDFN/10
Oper. Temp. (°C) -40 to 125 C
Budgetary
Price (See Notes)
1.15
查看更多

简化框图

技术文档

数据资料 Deep Cover Automotive 1-Wire Authenticator Mar 05, 2021

支持和培训

在Maxim的知识库中搜索您所需的答案。

过滤搜索

Maxim的专业工程师团队也会为您解答相应的技术问题,请访问Maxim的 支持中心

参量

Parametric specs for Secure Authenticators
Applications Automotive Secure Authentication
Secure Authentication of Accessories and Peripherals
Secure Boot or Download
Bus Type 1-Wire
Memory Type OTP
Memory Size 6 Kb
Deep Cover Yes
Package/Pins TDFN/10
Budgetary
Price (See Notes)
1.15
Parametric specs for 1-Wire Interface Products
Functions Authentication
VSUPPLY (V) 2.97 to 3.63
Package/Pins TDFN/10
Oper. Temp. (°C) -40 to 125 C
Budgetary
Price (See Notes)
1.15

主要特征

  • ECC-P256 Compute Engine
    • FIPS 186 ECDSA P256 Signature and Verification
    • ECDH Key Exchange for Session Key Establishment
    • ECDSA Authenticated R/W of Configurable Memory
  • SHA-256 Compute Engine
    • FIPS 198 HMAC for Bidirectional Authentication
  • SHA-256 One-Time Pad Encrypted R/W of Configurable Memory Through ECDH Established Key
  • One GPIO Pin with Optional Authentication Control
    • Open-Drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA Authenticated On/Off and State Read
    • Optional ECDSA Certificate Verification to Set On/Off after Multiblock Hash for Secure Boot
  • TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
  • Optional Chip-Generated Pr/Pu Key Pairs for ECC Operations
  • 6Kb of One-Time Programmable (OTP) for User Data, Keys, and Certificates
  • Unique and Unalterable Factory-Programmed 64-Bit Identification Number (ROM ID)
    • Optional Input Data Component to Crypto and Key Operations
  • Single-Contact, 1-Wire Interface Communication with Host at 9.09kbps and 62.5kbps
  • 3.3V ±10%, -40°C to +125°C Operating Range
  • ±8kV HBM ESD protection of 1-Wire IO Pin
  • 10-Pin TDFN Package
    • 3mm x 4mm TDFN Package
    • 3mm x 3mm, Side-Wettable TDFN Package
  • AEC-Q100 Grade 1

应用/用途

  • 配件和外设安全认证
  • 汽车安全认证
  • 鉴定和校准汽车零件/工具/附件
  • IoT节点加密保护
  • 安全引导或下载固件和/或系统参数
  • 安全储存主机控制器的密钥

描述

The DS28E40 is a secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) secu­rity functions. In addition to the security services provided by the hardware-implemented cryptographic engines, the device integrates a FIPS/NIST True Random Number Genera­tor (TRNG), 6Kb of One-Time Programmable (OTP) memory for user data, keys and certificates, one configurable General-Purpose Input/Output (GPIO), and a unique 64-bit ROM identification number (ROM ID).

The ECC public/private key capabilities operate from the NIST-defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are usable flexibly either in conjunc­tion with ECDSA operations or independently for multiple Hash-Based Message Authentication Code (HMAC) functions.

The GPIO pin is operated under command control and is configurable enabling support of authenticated and non-authenticated operation. The GPIO-authenticated operation supports ECDSA-based crypto-robust mode, enabling secure-boot of a host processor.

DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, including invasive and noninvasive methods, countermeasures include active die shield, encrypted storage of keys, and algorithmic methods.

简化框图

DS28E40: Simplified Block Diagram DS28E40: Simplified Block Diagram Zoom icon

技术文档

数据资料 Deep Cover Automotive 1-Wire Authenticator Mar 05, 2021

支持和培训

在Maxim的知识库中搜索您所需的答案。

过滤搜索

Maxim的专业工程师团队也会为您解答相应的技术问题,请访问Maxim的 支持中心