The DS28C36 is a DeepCover® secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (RNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).
The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.
Two GPIO pins can be independently operated under command control and include configurability supporting authenticated and nonauthenticated operation including an ECDSA-based crypto-robust mode to support secure-boot of a host processor.
DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.
|Part Number||Crypto Engine||Applications||Memory Type||Memory Size||Bus Type||VSUPPLY|
|Deep Cover||Oper. Temp.|
|EEPROM||4K x 1||I2C||2.97 to 3.63||Yes||-40 to +85|
|See All Secure Authenticators (28)|
| Pricing Notes: |
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.
|Device||Fab Process||Technology||Sample size||Rejects||FIT at 25°C||FIT at 55°C|
|App Note||7015||Back to Basics: Secure Hash Algorithms|
|App Note||6896||Why Now is a Good Time to Secure Your Embedded Systems with SHA-3|
|App Note||6891||Secure Authentication for Medical Disposables|
|User Guide||6796||DS28E39 Security User Guide|
|App Note||6465||How to Generate a DS28C36 Session Key|
|App Note||6435||How to Authenticate DS28C36 Data (User Memory/GPIO/Decrement Counter) with ECDSA|
|App Note||6434||How to Verify the DS28C36 ECDSA Certificate|
|App Note||6426||The Fundamentals of Secure Boot and Secure Download: How to Protect Firmware and Data within Embedded Devices|
|App Note||6391||Implementing Secure Authentication Without Being a Cryptography Expert|
|User Guide||6389||MAXREFDES155# Quick Start Guide|
|App Note||4717||Injection Molding an IC into a Connector or Consumable Item|
|Tutorial||4702||Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables|
|System Board||6388||MAXREFDES155#: DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths|
|Evaluation Board||9505||MAXAUTHDEMO DeepCover Secure Authenticator Demonstration Kit|
|Evaluation Board||9119||DS28C36EVKIT Evaluation Kit for the DS28C36 and DS2476|