MAX36011

Security Supervisor with Tamper Detection and Cryptography

Small Footprint Secure Memory with Advanced Security Protection


Please check latest availability status for a specific part variant.

Description

As Internet connectivity and greater intelligence get integrated into more products, these products can also boast more potential points of vulnerability if left unprotected. Embedded security technologies, such as security supervisors, can safeguard these designs from hacking, counterfeiting, and other security breaches faced by Internet of things (IoT) designs. The MAX36010/MAX36011 are low-power security supervisors designed for fiscal memory, internet security, and IP protection applications that require certificate-based or other public key cryptography schemes. The devices also incorporate sophisticated security mechanisms to protect sensitive information in secure memory, two pairs of external sensor input, and environmental monitors (temperature and voltage sensors) that erase the secure memory when an attack condition is detected.

One SPI, one I²C, and one UART interfaces are provided for secure, flexible communication to external system nodes. Device control and configuration are performed through a SPI, I²C, or UART interface.

The MAX36010/MAX36011 include on-chip 1KB secure memory that is always protected by dynamic sensors and environmental sensors. When there is a tamper event, the 1KB secure memory is erased in less than 1μs after the DRS has been completed. Tamper source and time of tamper is recorded in battery-backed registers. The MAX36010/MAX36011 enter a reset state until the tamper source is removed.

A real-time clock (RTC) is used to keep the current date and time. It is also useful when a tamper event happens, the tamper time is recorded and stored in a battery-backed register. The RTC has an alarm function. An alarm can be set 12 days in advance. The application can use the alarm to trigger the host processor on a daily basis for regular status monitoring and time adjusting between the host and MAX36010/MAX36011. When an alarm event happens, an output pulse is sent to the ALM pin. The RTC comes with a trim function. Certain number of clocks could be added or subtracted from RTC counter so as to compensate the time drift caused by temperature change on external crystal.

The MAX36010/MAX36011 support high-speed encryption with hardware accelerators for AES, RSA, ECDSA, SHA-1, SHA-224, SHA-256, DES, and 3DES. The hardware accelerator has an individual clock that is generated from a 65MHz internal ring oscillator. The MAX36010/MAX36011 act as coprocessors to encrypt data for the host processor. A true hardware random number generator is included for key generation and challenge generation. The MAX36010/MAX36011 provide side-channel attack countermeasures along with cryptography function. The MAX36010 supports symmetric key generation for AES and DES/3DES; whereas the MAX36011 supports both symmetric and asymmetric key generation for AES, DES/3DES, RSA, and ECDSA.

Sensitive information can be stored in the 1KB NV SRAM. Sensitive data transfer is in cipher text mode. Data in NVSRAM is encrypted by an AES-128 key before data is sent over SPI, I²C, or UART. The host processor must decrypt the data with the corresponding AES-128 key to retrieve useful information.

The device is powered by a 3.3V supply. A battery connection is provided for applications that want to maintain secure memory data for years without draining the main power supply. In battery-backed mode, the secure memory and security sensors consume less than 750nA (typ).

Key Features

  • Low-Power Security Supervisor Enables Cost-Effective Security Solution
    • 1024B Battery-Backed NV SRAM with High-Speed Erase
    • Battery-Backed Tamper Circuit and RTC
    • Low-Current Battery-Backup Operation
    • Operates from Single 3.3V Supply
  • Security Features Facilitate System-Level Protection
    • Tamper Detection with Fast Wipe Key/Data Detection
    • Secret Key Destruction on Tamper Events
    • Hardware Accelerators for AES, RSA, ECDSA, DES, 3DES, SHA-1, SHA-224, and SHA-256
    • True Hardware Random-Number Generator
    • Temperature and Voltage Sensors to Detect Attacks
    • 2 Pairs of External Sensor Tamper Detects
    • Time Stamp for Tamper Event
    • Encrypted NV SRAM Data Transfer
    • Unique 128-Bit Serial Number
  • Integrated Peripherals Allow for Easy Integration into Applications
    • Programmable Alarm with External Output
    • CPU Supervisor
    • SPI/I²C/UART Interface
    • Up to 4 General-Purpose I/O Pins

Applications/Uses

  • Electronic Signature Generation
  • Gaming Machines
  • Internet Security
  • IP Protection
  • Points of Sales
  • Secure Access Control
  • Security and Banking Tokens
  • Smart Control Systems for Home Automation
  • Smart Factory for Industrial 4.0
  • Smart Grid Security
Part NumberDigital Inputs MonitoredInternal Key Memory
(Bytes)
Package/PinsOper. Temp.
(°C)
MAX36010 21024
TQFN-CU/40
WLP/56
-40 to +85
MAX36011 
TQFN-CU/40
WLP/56
See All Security Managers (12)
Pricing Notes:
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.


MAX36010EVKIT: Evaluation Kit for the MAX36010, MAX36011

Quality and Environmental Data

Request Reliability Report for: MAX36011 
Lead-Free Package Tin (Sn) Whisker Reports
Device   Fab Process   Technology   Sample size   Rejects   FIT at 25°C   FIT at 55°C  

Note : The failure rates are summarized by technology and mapped to the associated material part numbers. The failure rates are highly dependent on the number of units tested.

Quality Management System >
Environmental Management System >

 
Status:
Package:
Temperature:

Related Resources


DS28C40
Deep Cover Automotive I²C Authenticator

  • ECC-P256 Compute Engine
  • SHA-256 Compute Engine
  • SHA-256 One-Time Pad Encrypted R/W of Configurable Memory Using an ECDH Established Key

DS28E16
1-Wire SHA-3 Secure Authenticator

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates Peripherals
  • Supplemental Features Enable Easy Integration into End Applications

DS28E84
DeepCover Radiation Resistant, High-Capacity 1-Wire Secure Authenticator

  • High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
  • ECC-P256 Compute Engine
  • SHA-256 Compute Engine

DS28E39
DeepCover Secure ECDSA Bidirectional Authenticator with ChipDNA PUF Protection

  • Robust Countermeasures Protect Against Security Attacks
  • ECDSA Authenticated R/W of Stored Data and Counter
  • Efficient Public-Key Authentication Solution to Authenticate Peripherals


Electronics in Vehicles (ELIV) 2019
10/16/2019 - 10/17/2019, Bonn, Germany
The international VDI Congress ELIV (Electronics In Vehicles) is THE event for all experts in the field of electrical and electronical car engineering and integration of mechanical and electronical systems.

RSVP