Embedded Security

Embedded systems need protection from malicious attacks. Add tamper detection to your system to protect sensitive data and encryption keys. Or safeguard your IP and R&D investment from cloning and unauthorized use. With Maxim’s solutions, you can easily secure your entire system.

Security manager products work with your microcontroller to protect information.  Secure Authenticator ICs provide crypto-strong authentication. Our secure microcontrollers have built-in FIPS-certified hardware cryptographic engines that support industry-standard algorithms.


DS28E16
1-Wire SHA-3 Secure Authenticator

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates Peripherals
  • Supplemental Features Enable Easy Integration into End Applications

DS28E84
DeepCover Radiation Resistant, High-Capacity 1-Wire Secure Authenticator

  • High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
  • ECC-P256 Compute Engine
  • SHA-256 Compute Engine

DS28E39
DeepCover Secure ECDSA Bidirectional Authenticator with ChipDNA PUF Protection

  • Robust Countermeasures Protect Against Security Attacks
  • ECDSA Authenticated R/W of Stored Data and Counter
  • Efficient Public-Key Authentication Solution to Authenticate Peripherals

DS2477
DeepCover Secure SHA-3 Coprocessor with ChipDNA PUF Protection

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates and Manages Peripherals
  • Supplemental Features Enable Easy Integration into End Applications

MAX36010
Security Supervisor with Tamper Detection and Cryptography

  • Low-Power Security Supervisor Enables Cost-Effective Security Solution
  • Security Features Facilitate System-Level Protection
  • Integrated Peripherals Allow for Easy Integration into Applications

MAX36011
Security Supervisor with Tamper Detection and Cryptography

  • Low-Power Security Supervisor Enables Cost-Effective Security Solution
  • Security Features Facilitate System-Level Protection
  • Integrated Peripherals Allow for Easy Integration into Applications