Keywords: public key, private key, ecdsa, digital signature, elliptic curve, secure hash, sha-256, sha, ecc-256, hardware accelerator, integrated ecc-256, integrated sha, signature, authentic, asymmetric cryptography, crypto engine, cryptographic engine
Related Parts

How to Authenticate DS28C36 Data (User Memory/GPIO/Decrement Counter) with ECDSA

By:  Clay Greene

Abstract: The DS28C36 is a secure authenticator providing a core set of cryptographic tools derived from integrated asymmetric (ECC-256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware crypto engines, the device integrates a FIPS/NIST true random number generator (TRNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID). This application note describes the procedures for setup and verification of an ECDSA signature on the DS28C36. An example of these procedures is referenced in the Appendix.

This document is written for a highly specific application and contains information about proprietary technology, and is only available to customers whose requirements closely match the application. To request the full document, please complete the form below.

The application note you have requested requires the following contact and project information:

Contact Information

Name: *
Company: *
Company division
Title/Position: *
Address: *
City: *
Postal Code: *
Country: *
Email Address: *
Email Address (Confirm): *
Phone Number: *

Your Project

Project Name: *
Project Description and Application: *
Projected Volume: *
Estimated Design Freeze Date: (optional)
Estimated Product Start Date: (optional)
* = Required

APPLICATION NOTE 6435, AN6435, AN 6435, APP6435, Appnote6435, Appnote 6435