Secure Authentication and Counterfeit Protection Solutions

Systems with replaceable or limited life sensors, peripherals, modules, or consumables are commonly targeted by unauthorized aftermarket companies. These counterfeit replacements can introduce safety concerns, reduce quality, and negatively impact OEM revenue. With DeepCover® secure authenticators, a cryptographic solution can easily be implemented for any system where digital processing capabilities exist. With over 3.2 billion secure authentication units shipped, we are experts at helping you implement hardware-based physical security to achieve low-cost counterfeit protection, peripheral device authentication, secure feature setting, and more.

Also see:




DeepCover Secure Authenticators Featured Products


Symmetric Key Authenticators

Product Device Type Crypto Engine Interface Features
DS28E50 Authenticator SHA-3 1-Wire® SHA-3 with ChipDNA™ PUF protection, authenticated decrement counter, FIPS/NIST compliant TRNG
DS2477 Coprocessor SHA-3 I2C, 1-Wire SHA-3, secure I²C coprocessor with built-in 1-Wire master
MAX66242 Tag Authenticator SHA-256 NFC, I2C ISO/IEC 15693 HF and I2C dual interfaces, SHA-256 two-way authentication, RF energy harvesting for external supply
MAX66300 Reader Coprocessor SHA-256 NFC, SPI, UART NFC transceiver, SHA-256 coprocessor and secure host side key storage for MAX66240/MAX66242

Asymmetric Key Authenticators

Product Device Type Crypto Engine Interface Features
DS28E38 Authenticator ECC-P256 1-Wire ECDSA P256 authentication with ChipDNA™ PUF protection, authenticated decrement counter, TRNG external data source
DS28C36 Authenticator ECC-P256, SHA-256 I2C ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing
DS28E36 Authenticator ECC-P256, SHA-256 1-Wire ECDSA P256 or SHA-256 two-way authentication, optional authentication protection of user EEPROM, TRNG source, secure GPIOs and download processing
DS28E83 Authenticator ECC-P256, SHA-256 1-Wire Gamma/eBeam sterilization tolerant, ECDSA P256 or SHA-256 two-way authentication, protected user OTP, secure download, TRNG source, secure GPIO
DS2476 Coprocessor ECC-P256, SHA-256 I2C ECDSA/SHA-256 coprocessor, secure host-side key storage for DS28E38/DS28C36/DS28E36/DS28E83

DeepCover Secure Authenticators Evaluation Kits


MAXREFDES168 Diagram

SECURE AUTHENTICATION WITH ARM PROCESSORS

Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection

Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection

Learn about the DS28E50, the first DeepCover® secure authenticator with the SHA-3 algorithm. Watch firsthand what SHA-3 authentication, combined with the ChipDNA physically unclonable function (PUF), can do for your next project.

Learn more ›

Secure Boot and Secure Download - Part 1: Protecting IoT Devices with Secure Authentication

Discover how malicious attacks can infect embedded firmware prevalent in many of today’s IoT or microcontroller-based devices. You’ll learn the ways attackers exploit vulnerabilities within the device and the importance of verifying the authenticity and validity of product firmware through secure boot and download. To learn more about the technologies behind secure authentication, watch the next video in the series, “Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security.”

Learn more: Secure Authenticators ›

Secure Boot and Secure Download - Part 2: Technologies Behind Embedded Security

Part 2 of this video series provides a high-level overview of the technologies in embedded system security. Learn how the cryptographic tools of Maxim’s secure authenticators help verify the authenticity and integrity of firmware distributed to IoT devices. To see a specific application of a cost-effective, hardware-based IoT security solution, watch the next video in the series, “Secure Boot and Secure Download - Part 3: Using the DS28C36.”

Learn more: App Note ›

Secure Boot and Secure Download - Part 3: Using the DS28C36

In this last video of the series, see how the DS28C36, a proven embedded security solution, helps address the threats that plague IoT devices. Learn how this DeepCover® secure authenticator can offload the system microcontroller by performing the heavy computational math required to prove the authenticity and integrity of firmware or data updates.

Learn more: DS28C36 ›

Securely Manage Disposable Medical Accessories with DS28E36 and MAX66242

How can you be sure a disposable medical accessory is authentic and has not been used on another patient? Watch a demonstration of the DS28E36 and MAX66242 secure authenticators in a medical stapler application to learn how to securely manage data, calibration and end use. The demonstration also uses the MAX66300 NFC/RFID reader and PC software to emulate the medical procedure and perform patient identification and device authentication.

Learn more: DS28E36 ›

Learn more: MAX66242 ›

Learn more: MAX66300 ›

Introduction to the DS28E83 DeepCover® Radiation Resistant 1-Wire Secure Authenticator

This video provides an introduction to the DS28E83, a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions.

Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection

The DS28E50 is an ECDSA public key-based secure authenticator that incorporates Maxim’s patented ChipDNA™ PUF technology. ChipDNA technology involves a physically unclonable function (PUF) that enables the DS28E50 to deliver cost-effective protection against invasive physical attacks.

Introduction to the DS28E84 DeepCover® Radiation Resistant, High Capacity 1-Wire Authenticator

This video provides an introduction to the DS28E84, a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions.

Introduction to the DS28E16 DeepCover® 1-Wire SHA-3 Secure Authenticator

This video provides an introduction to the DS28E16 DeepCover® 1-Wire SHA-3 Secure Authenticator

Introduction to the DS28E39 DeepCover® Secure ECDSA Authenticator with ChipDNATM PUF Protection

This video provides an introduction to the DS28E39 which is a DeepCover® Secure ECDSA Authenticator with ChipDNATM PUF Protection

Introduction to the MAXQ1062 DeepCover Cryptographic Controller for Embedded Devices

This video provides an introduction to the MAXQ1062, a cryptographic controller that makes it fast and easy to implement full security for embedded, connected products without requiring firmware development.

Introduction to the DS2477 DeepCover® Secure SHA-3 Coprocessor with ChipDNATM PUF Protection

This video provides an introduction to the DS2477, a DeepCover Secure SHA-3 Coprocessor with ChipDNA PUF Protection

Easily Secure Your Medical Disposables

Protect medical disposables with the cryptographic, cost-effective DS28E83 DeepCover® 1-Wire® secure authenticator. This is a radiation-tolerant device that safeguards medical disposables from counterfeiting and other security breaches.

Learn more: DS28E83 ›

MAX66242 DeepCover安全认证器评估套件

MAX66242

包括ISO 15693、I2C、SHA-256标签/应答器,带4Kb用户EEPROM、RF/I2C接口和能量收集。

Learn more ›

Evaluation Kit for the DS28E38 DeepCover Secure Authenticator

DS28E38

ECDSA asymmetric authentication with ChipDNA PUF protection and 2Kb user EEPROM.

Learn more ›

Evaluation Kit for the DS28E25 and DS2465 DeepCover Secure Authenticators

DS28E25

SHA-256 bidirectional authentication with 4Kb user EEPROM and 1-Wire interface.

Learn more ›

Evaluation Kit for the MAX66242 DeepCover Secure Authenticator

MAX66242

Includes ISO 15693, I2C, SHA-256 tag/transponder with 4Kb user EEPROM, RF/I2C interface and energy harvesting.

Learn more ›


DeepCover Secure Authenticators Design Resources


White Papers

Application Notes

Guides


Blogs

Related Videos