DeepCover Secure Memory with I2C SHA-256 and 3Kb User EEPROM

Protect Your Development Investment with SHA-256 Crypto-Strong Authentication and Encryption

Please check latest availability status for a specific part variant.


DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible. The DeepCover Secure Memory (DS28C22) combines crypto-strong, bidirectional, secure challenge-and-response authentication and small message encryption functionality with an implementation based on the FIPS 180-specified Secure Hash Algorithm (SHA-256). A 3Kb user-programmable EEPROM array provides nonvolatile storage for application data and additional protected memory holds a read-protected secret for SHA-256 operations and settings for user memory control. Each device has its own guaranteed unique and unalterable 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. This unique ROM ID is used as a fundamental input parameter for cryptographic operations and also serves as an electronic serial number within the application. A bidirectional security model enables two-way authentication and encryption between a host system and slave-embedded DS28C22. Slave-to-host authentication is used by a host system to securely validate that an attached or embedded DS28C22 is authentic. Host-to-slave authentication is used to protect DS28C22 user memory from being modified by a nonauthentic host. The SHA-256 message authentication code (MAC), which the DS28C22 generates, is computed from data in the user memory, an on-chip secret, a host random challenge, and the 64-bit ROM ID. The device also facilitates encrypted read and write between host and slave using a one time pad computed by the SHA-256 engine. When not in use, the DS28C22 can be put in sleep mode where power consumption is minimal.

DS28C22: Typical Application Circuit DS28C22: Typical Application Circuit Enlarge+

Key Features

  • Symmetric Key-Based Bidirectional Secure Authentication and Encryption Model Based on SHA-256
  • Dedicated Hardware-Accelerated SHA Engine for Generating SHA-256 MACs
  • Strong Authentication with a 256-Bit, User-Programmable Secret, and Input Challenge
  • 3072 Bits of User EEPROM Partitioned Into 12 Pages of 256 Bits
  • User-Programmable and Irreversible EEPROM Protection Modes Including Authentication, Write and Read Protect, Encryptions, and OTP/EPROM Emulation
  • Supports 100kHz and 400kHz I2C Communication Speeds
  • Supports Power-Saving Sleep Mode at 0.5µA (typ)
  • Operating Range: 3.3V ±10%, -40°C to +85°C
  • 8-Pin TDFN Package


  • Authentication of Network-Attached Appliances
  • Key Generation and Secure Exchange for Cryptographic Systems
  • Secure Feature Setting for Configurable Systems
  • System Intellectual Property Protection
Part NumberCrypto EngineApplicationsMemory TypeMemory SizeBus TypeVSUPPLY
Deep CoverOper. Temp.
See Notes
DS28C22 SymmetricIP ProtectionEEPROM3K x 1I2C2.97 to 3.63Yes-40 to +85
$15.00 @1
See All Secure Authenticators (28)
Pricing Notes:
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.

DS28C22EVKIT: Evaluation System for the DS28C22

CAD Symbols and Footprints

  • DS28C22Q+T
  • DS28C22Q+U
  • Device   Fab Process   Technology   Sample size   Rejects   FIT at 25°C   FIT at 55°C  

    Note : The failure rates are summarized by technology and mapped to the associated material part numbers. The failure rates are highly dependent on the number of units tested.

    Quality Management System >
    Environmental Management System >


    Related Resources

    1-Wire SHA-3 Secure Authenticator

    • Robust Countermeasures Protect Against Security Attacks
    • Efficient Secure Hash Algorithm Authenticates Peripherals
    • Supplemental Features Enable Easy Integration into End Applications

    DeepCover Radiation Resistant, High-Capacity 1-Wire Secure Authenticator

    • High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
    • ECC-P256 Compute Engine
    • SHA-256 Compute Engine

    DeepCover Secure ECDSA Bidirectional Authenticator with ChipDNA PUF Protection

    • Robust Countermeasures Protect Against Security Attacks
    • ECDSA Authenticated R/W of Stored Data and Counter
    • Efficient Public-Key Authentication Solution to Authenticate Peripherals

    DeepCover Secure SHA-3 Coprocessor with ChipDNA PUF Protection

    • Robust Countermeasures Protect Against Security Attacks
    • Efficient Secure Hash Algorithm Authenticates and Manages Peripherals
    • Supplemental Features Enable Easy Integration into End Applications

    Electronics in Vehicles (ELIV) 2019
    10/18/2019 - 10/19/2019, Bonn, Germany
    The international VDI Congress ELIV (Electronics In Vehicles) is THE event for all experts in the field of electrical and electronical car engineering and integration of mechanical and electronical systems.