It can be a very hostile world for electronic equipment to operate within. Systems with replaceable or limited life sensors, peripherals, modules, or consumables are commonly targeted by unauthorized aftermarket companies. These counterfeit replacements can introduce safety concerns, reduce quality, and negatively impact OEM revenue. Similarly, with relentless attacks and serious consequences for breaches, the security requirements for medical and industrial IoT products have never been more important. With DeepCover® secure authenticators, a cryptographic solution to eliminate these issues can easily be implemented for any system.
With over 4 billion secure authentication units shipped, we are experts at helping you implement hardware-based physical security to achieve low-cost counterfeit protection, peripheral device authentication, secure feature setting, and more.
Maxim Security Lab: Explore security topics and test drive secure authenticators ›
Featured Videos
Featured Technical Documents
Browse Popular Technical Documents:
Technical Documentation

Featured Blogs
Latest Blogs
March 03, 2022
It is possible to deliver power and data to operate I2C and SPI endpoints, such as humidity or temperature sensors, with the use of a single wire connection and ground using Analog Devices’ 1-Wire technology.
September 17, 2020
See how secure authenticators and coprocessors make it easier for you to integrate cryptography to protect your embedded designs.
September 10, 2020
Understand the threats that cryptographic systems face and how you can guard against these threats.
August 18, 2020
Learn why a hardware-based approach to cryptography provides more robust protection of IoT designs than software cryptography.
August 06, 2020
Learn how a new cryptographic coprocessor makes it easy to implement end-to-end encryption and other cybersecurity features for IoT devices.
July 02, 2020
Learn how physically unclonable function (PUF) technology works and what makes it a robust security solution for embedded systems.
June 16, 2020
Understand how cryptography algorithms, including symmetric keys and asymmetric keys, work their magic to protect designs from security threats.
June 09, 2020
Get a better understanding of how modern cryptography works, with special emphasis on asymmetric and symmetric keys.
May 07, 2020
Get up to speed on the basics of cryptography, so you can protect your IoT designs from hackers and other security threats.
April 09, 2020
Counterfeit vehicle parts are a potential safety hazard. Read this blog post to learn how secure authentication easily protects your automotive designs from security threats.
Videos
Featured Products
Symmetric Key Authenticators
Product | Device Type | Crypto Engine | Interface | Features |
---|---|---|---|---|
DS28E50 DS28C50 | Authenticator | SHA-3 | 1-Wire® I2C | SHA-3 bi-directional authentication with ChipDNA™ PUF protection, 2Kb of secure EEPROM, authenticated decrement counter, secure GPIO, NIST compliant TRNG |
DS28E16 DS28C16 | Authenticator | SHA-3 | 1-Wire® I2C | SHA-3 authentication with 256b of EEPROM and decrement counter |
DS2477 | Coprocessor | SHA-3 | I2C, 1-Wire | SHA-3, secure I²C coprocessor with built-in 1-Wire master |
MAX66242 | Tag Authenticator | SHA-256 | NFC, I2C | IEC 15693 HF and I²C dual interfaces, SHA-256 two-way authentication, 4Kb of secure EEPROM, RF energy harvesting for external supply |
MAX66300 | Reader Coprocessor | SHA-256 | NFC, SPI, UART | NFC transceiver, SHA-256 coprocessor and secure host side key storage for MAX66240/MAX66242 |
Asymmetric Key Authenticators
Product | Device Type | Crypto Engine | Interface | Features |
---|---|---|---|---|
DS28E39 DS28C39 | Authenticator | ECC-P256 | 1-Wire I2C | ECDSA P256 bi-directional authentication with ChipDNA™ PUF protection, 2Kb secure EEPROM, authenticated decrement counter, NIST compliant TRNG |
DS28E36 DS28C36 | Authenticator | ECC-P256, SHA-256 | 1-Wire I2C | ECDSA P256 or SHA-256 bi-directional authentication, ECDH key establishment, NIST compliant TRNG, secure GPIOs, 4Kb secure EEPROM, secure download processing |
DS28E83 | Authenticator | ECC-P256, SHA-256 | 1-Wire | Radiation sterilization tolerant, ECDSA P256 or SHA-256 bi-directional authentication, 10Kb secure OTP, secure download, NIST compliant TRNG source, secure GPIO |
DS28E84 | Authenticator | ECC-P256, SHA-256 | 1-Wire | DS28E83 equivalent with an additional 15Kb of FRAM |
DS28E40 DS28C40 | Authenticator | ECC-P256, SHA-256 | 1-Wire I2C | Automotive AECQ-100 G1, ECDSA P256 or SHA-256 bi-directional authentication, 6Kb secure OTP, ECDH key establishment, NIST compliant TRNG, secure GPIOs, secure download processing |
DS2476 | Coprocessor | ECC-P256, SHA-256 | I2C | ECDSA/SHA-256 coprocessor, secure host-side key storage for DS28E38/DS28C36/DS28E36/DS28E83 |
Authenticators for IoT
Product | Crypto Engine | Interface | Features |
---|---|---|---|
DS28S60 | ECC-P256, SHA-256, AES-128 | SPI | Protected with ChipDNA PUF, ECDSA sign/verify, ECDH key establishment, SHA-256 MAC/HMAC, AES-128 GCM, SP 800-90B TRNG, 3.6K Bytes Secure NVM for application/keys/certificates, 100nA low power mode, high-speed 20MHz SPI |
MAXQ1061 MAXQ1062 | ECC-P256/384/521, ECC BP-256/384/512, ECDH, SHA-256/384/512, AES-128/256 | I2C, SPI | Full TLS 1.2 toolbox, 32KB (MAXQ1061) or 8KB (MAXQ1062) EEPROM-based file system, life cycle management of certificates and keys, AES-128/256 (ECB, CBC, GCM), ECC NIST & Brainpool, ECDSA sign/verify, ECDH key establishment, SHA-2 MAC/HMAC/ECIES, TRNG |
MAXQ1065 | ECC-P256, SHA-256, AES-128/256 | SPI | Protected with ChipDNA PUF, ECDSA sign/verify, ECDH key establishment, SHA-256 MAC/HMAC, AES-128/256 (ECB, CBC, GCM), SP800-90A/C TRNG, 8KB Secure NVM, 100nA low power mode, 10MHz SPI |