Secure Authenticators

From a digital ID to crypto-strong authentication, Maxim's secure authenticators protect your investment, revenue stream, and reputation—even when interconnects are limited.

With our DeepCover® Secure Authenticators, you can implement advanced physical security to achieve the ultimate in low-cost IP protection, clone prevention, and peripheral authentication.

  • Protect R&D investment by preventing aftermarket knockoffs
  • Authenticate peripherals, including network-attached equipment
  • Implement secure features
  • Control and manage reference designs

DeepCover Secure Authenticators 

All Secure Authenticators 

Also see:
Authentication Applications
DeepCover Embedded Security Technology
Programming Secure Authenticators

Authentication Advisor Tool

We can guide you in choosing the right part to secure your application. Start by selecting your application area:

Medical

Medical

Smart Cables

Smart Cables

Printers

Printers

Consumer

Consumer

Communications

Communications

Batteries

Batteries

Industrial Control

Industrial Control

FPGA

FPGA

NFC

NFC

Other

Other

Featured


Resources



Safeguard Your Connected Products with Turnkey Security
4:00 min
May 2017



Using the MAXREFDES155 – Protecting the Internet of Things
8:08 min
March 2017



Add Counterfeit Protection with Maxim's DeepCover® Secure Authenticators
3:36 min
May 2014



DS28E35 DeepCover® Secure Authenticator
2:38 min
July 2013



ChipDNA–Defend Your IoT Designs from Hackers
2:14 min
November 2017



How to Setup the DS28E38 Evaluation Kit and Perform ECDSA Authentication
7:29 min
November 2017



[Distributor] Introduction to the MAX32565 DeepCover Secure Cortex-M4F Microcontroller with Contactless Interface and Bluetooth Radio
00:15:11 min
February 2018



[Distributor] Introduction to the MAX32558 DeepCover Secure Cortex-M3 Flash Microcontroller
13:19 min
June 2018



Fundamentals of DeepCover Secure Authentication
16:49 min
August 2018



Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security
8:57 min
February 2018



Secure Boot and Secure Download - Part 3: Using the DS28C36
4:33 min
February 2018



Secure Boot and Secure Download - Part 1: Protecting IoT Devices with Secure Authentication
5:36 min
February 2018



Introducing the MAX32620FTHR Prototyping Platform
5:33 min
April 2018



Introduction to the DS28E83 DeepCover® Radiation Resistant 1-Wire Secure Authenticator
21:10 min
June 2018



[Distributor] Introduction to the MAX32510 DeepCover Secure ARM Cortex-M3-Based Flash Microcontroller
21:06 min
April 2018



[Internal] Introduction to the MAX32510 DeepCover Secure ARM Cortex-M3-Based Flash Microcontroller
22:14 min
April 2018



[Internal] Introduction to the MAX32558 DeepCover Secure Cortex-M3 Flash Microcontroller
13:52 min
June 2018



[Internal] Introduction to the DS28E83 DeepCover® Radiation Resistant 1-Wire Secure Authenticator
45:46 min
June 2018



Introduction to the MAX32558 DeepCover Secure Cortex-M3 Flash Microcontroller
06:21 min
June 2018



[Distributor] Introduction to the DS28E83 DeepCover® Radiation Resistant 1-Wire Secure Authenticator
45:46 min
June 2018



[Internal] Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection
33:59 min
September 2018



[Distributor] Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection
33:59 min
September 2018



Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection
12:11 min
September 2018