DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.
The DeepCover Secure Authenticator (DS2465) is a SHA-256 coprocessor with built-in 1-Wire® master that provides the SHA-256 and memory functionality required by a host system to communicate with and operate a 1-Wire SHA-256 slave. In addition, it performs protocol conversion between the I2C master and any attached 1-Wire SHA-256 slaves. For 1-Wire line driving, internal user-adjustable timers relieve the system host processor from generating time-critical 1-Wire waveforms, supporting both standard and overdrive 1-Wire communication speeds. The 1-Wire line can be powered down under software control. Strong pullup features support 1-Wire power delivery to 1-Wire devices such as EEPROMs. When not in use, the DS2465 can be put in sleep mode where power consumption is minimal.
A DS2465 evaluation board is included in each of the authenticator evaluation kits below.
|2.97 to 3.63|
|-40 to +85|
|See All 1-Wire Interface Products (9)|
|Part Number||Crypto Engine||Applications||Memory Type||Memory Size||Bus Type||VSUPPLY|
|Deep Cover||Oper. Temp.|
|2.97 to 3.63||Yes||-40 to +85|
|See All Secure Authenticators (23)|
| Pricing Notes: |
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.
|Device||Fab Process||Technology||Sample size||Rejects||FIT at 25°C||FIT at 55°C|
|App Note||6391||Implementing Secure Authentication Without Being a Cryptography Expert|
|User Guide||6296||MAXREFDES143# Quick Start Guide|
|App Note||5940||Secure 3D Printing - the New Disruptive Technology - and Watch the Market Grow|
|App Note||5785||Implement Heightened Security with a SHA-256 Master/Slave Authentication System|
|App Note||5779||Introduction to SHA-256 Master/Slave Authentication|
|Tutorial||5716||Hardware Security ICs Offer Large Security Returns at a Low Cost|
|App Note||5546||The Fundamentals of a SHA-256 Master/Slave Authentication System|
|Tutorial||5518||Uptime Protects the Bottom Line|
|Tutorial||4702||Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables|
|App Note||3675||Protect Your R&D Investment with Secure Authentication|
|System Board||6295||MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing and Notification|
|Evaluation Board||8254||DS28E22EVKIT Evaluation System for the DS28E22 and DS2465|
|Evaluation Board||8234||DS28E15EVKIT Evaluation System for the DS28E15 and DS2465|
|Evaluation Board||8195||DS28E25EVKIT Evaluation System for the DS28E25 and DS2465|