Systems with replaceable or limited life sensors, peripherals, modules, or consumables are commonly targeted by unauthorized aftermarket companies. These counterfeit replacements can introduce safety concerns, reduce quality, and negatively impact OEM revenue. With DeepCover® secure authenticators, a cryptographic solution can easily be implemented for any system where digital processing capabilities exist. With over 3.2 billion secure authentication units shipped, we are experts at helping you implement hardware-based physical security to achieve low-cost counterfeit protection, peripheral device authentication, secure feature setting, and more.
|Product||Device Type||Crypto Engine||Interface||Features|
|DS28E50||Authenticator||SHA-3||1-Wire®||SHA-3 with ChipDNA™ PUF protection, authenticated decrement counter, FIPS/NIST compliant TRNG|
|DS2477||Coprocessor||SHA-3||I2C, 1-Wire||SHA-3, secure I²C coprocessor with built-in 1-Wire master|
|MAX66242||Tag Authenticator||SHA-256||NFC, I2C||ISO/IEC 15693 HF and I2C dual interfaces, SHA-256 two-way authentication, RF energy harvesting for external supply|
|MAX66300||Reader Coprocessor||SHA-256||NFC, SPI, UART||NFC transceiver, SHA-256 coprocessor and secure host side key storage for MAX66240/MAX66242|
|Product||Device Type||Crypto Engine||Interface||Features|
|DS28E38||Authenticator||ECC-P256||1-Wire||ECDSA P256 authentication with ChipDNA™ PUF protection, authenticated decrement counter, TRNG external data source|
|DS28C36||Authenticator||ECC-P256, SHA-256||I2C||ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing|
|DS28E36||Authenticator||ECC-P256, SHA-256||1-Wire||ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing|
|DS28E83||Authenticator||ECC-P256, SHA-256||1-Wire||Gamma/eBeam sterilization tolerant, ECDSA P256 or SHA-256 two-way authentication, protected user OTP, secure download, TRNG source, secure GPIO|
|DS2476||Coprocessor||ECC-P256, SHA-256||I2C||ECDSA/SHA-256 coprocessor, secure host-side key storage for DS28E38/DS28C36/DS28E36/DS28E83|
This video provides an introduction to the DS28E84, a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions.
This video provides an introduction to the DS28E16 DeepCover® 1-Wire SHA-3 Secure Authenticator
This video provides an introduction to the DS28E39 which is a DeepCover® Secure ECDSA Authenticator with ChipDNATM PUF Protection
This video provides an introduction to the MAXQ1062, a cryptographic controller that makes it fast and easy to implement full security for embedded, connected products without requiring firmware development.
This video provides an introduction to the DS2477, a DeepCover Secure SHA-3 Coprocessor with ChipDNA PUF Protection
Learn about the DS28E50, the first DeepCover® secure authenticator with the SHA-3 algorithm. Watch firsthand what SHA-3 authentication, combined with the ChipDNA physically unclonable function (PUF), can do for your next project.
Learn more ›
The DS28E50 is an ECDSA public key-based secure authenticator that incorporates Maxim’s patented ChipDNA™ PUF technology. ChipDNA technology involves a physically unclonable function (PUF) that enables the DS28E50 to deliver cost-effective protection against invasive physical attacks.
This video provides an introduction to the DS28E83, a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions.
How can you be sure a disposable medical accessory is authentic and has not been used on another patient? Watch a demonstration of the DS28E36 and MAX66242 secure authenticators in a medical stapler application to learn how to securely manage data, calibration and end use. The demonstration also uses the MAX66300 NFC/RFID reader and PC software to emulate the medical procedure and perform patient identification and device authentication.
Part 2 of this video series provides a high-level overview of the technologies in embedded system security. Learn how the cryptographic tools of Maxim’s secure authenticators help verify the authenticity and integrity of firmware distributed to IoT devices. To see a specific application of a cost-effective, hardware-based IoT security solution, watch the next video in the series, “Secure Boot and Secure Download - Part 3: Using the DS28C36.”
In this last video of the series, see how the DS28C36, a proven embedded security solution, helps address the threats that plague IoT devices. Learn how this DeepCover® secure authenticator can offload the system microcontroller by performing the heavy computational math required to prove the authenticity and integrity of firmware or data updates.
Discover how malicious attacks can infect embedded firmware prevalent in many of today’s IoT or microcontroller-based devices. You’ll learn the ways attackers exploit vulnerabilities within the device and the importance of verifying the authenticity and validity of product firmware through secure boot and download. To learn more about the technologies behind secure authentication, watch the next video in the series, “Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security.”
ChipDNA–Defend Your IoT Designs from Hackers
2:14 November 17, 2017
Demonstrating Cryptographic Hash, Signatures, and Authentication
11:53 October 31, 2017
Securely Manage Disposable Medical Accessories with DS28E36 and MAX66242
8:17 March 09, 2018
Secure Boot and Secure Download - Part 1: Protecting IoT Devices with Secure Authentication
5:36 February 14, 2018