DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible. The DeepCover Secure Authenticator (DS24L65) is a SHA-256 coprocessor with built-in 1-Wire® master that provides the SHA-256 and memory functionality required by a host system to communicate with and operate a 1-Wire SHA-256 slave. In addition, it performs protocol conversion between the I²C master and any attached 1-Wire SHA-256 slaves. For 1-Wire line driving, internal user-adjustable timers relieve the system host processor from generating time-critical 1-Wire waveforms, supporting both standard and overdrive 1-Wire communication speeds. The 1-Wire line can be powered down under software control. Strong pullup features support 1-Wire power delivery to 1-Wire devices such as EEPROMs. When not in use, the DS24L65 can be put in sleep mode where power consumption is minimal.
A DS24L65 evaluation board is included in each of the authenticator evaluation kits below.
|1.71 to 1.89|
|-40 to +85||$1.06 @1k|
|See All 1-Wire Interface Products (9)|
|Part Number||Crypto Engine||Applications||Memory Type||Memory Size||Bus Type||VSUPPLY|
|Deep Cover||Oper. Temp.|
|1.71 to 1.89||Yes||-40 to +85|
|See All Secure Authenticators (23)|
| Pricing Notes: |
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.
|Device||Fab Process||Technology||Sample size||Rejects||FIT at 25°C||FIT at 55°C|
|App Note||5779||Introduction to SHA-256 Master/Slave Authentication|
|Tutorial||5716||Hardware Security ICs Offer Large Security Returns at a Low Cost|
|App Note||5546||The Fundamentals of a SHA-256 Master/Slave Authentication System|
|Tutorial||5518||Uptime Protects the Bottom Line|
|Tutorial||4702||Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables|
|App Note||3675||Protect Your R&D Investment with Secure Authentication|