Keywords: public key, private key, ecdsa, digital signature, elliptic curve, secure hash, sha-256, sha, ecc-256, hardware accelerator, signature, authentic, asymmetric cryptography, cryptographic engine, DeepCover authenticator, ECDSA authentication
Related Parts
APPLICATION NOTE 6465

How to Generate a DS28C36 Session Key

By:  Clay Greene

Abstract: The DS28C36 is a secure authenticator providing a core set of cryptographic tools derived from integrated asymmetric (ECC-256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware crypto engines, the device integrates a FIPS/NIST true random number generator (TRNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID). This application note describes the procedures for setup and generation of a Session Key on the DS28C36. An example of these procedures is referenced in the Appendix.


This document is written for a highly specific application and contains information about proprietary technology, and is only available to customers whose requirements closely match the application. To request the full document, please complete the form below.

The application note you have requested requires the following contact and project information:

Contact Information



Name: *
Company: *
Company division
Title/Position: *
Address: *
City: *
State:
Postal Code: *
Country: *
Email Address: *
Email Address (Confirm): *
Phone Number: *


Your Project

Project Name: *
Project Description and Application: *
Projected Volume: *
Estimated Design Freeze Date: (optional)
Estimated Product Start Date: (optional)
Comments:
* = Required



APPLICATION NOTE 6465, AN6465, AN 6465, APP6465, Appnote6465, Appnote 6465