Top

DeepCover I2C Secure SHA-3 Authenticator with ChipDNA PUF Protection

Protect Your Development Investment with Crypto-Strong Authentication and Advanced Physical Security

Product Details

Key Features

Applications/Uses

Parametric specs for Secure Authenticators
Crypto Engine Symmetric
End Equipment Access Control
Asset Tracking
IP Protection
Identification Systems
Medical Sensor Authentication and Calibration
PCB ID and Authentication
Print Cartridge Authentication
Printer Cartridge Configuration and Monitoring
Rack Card Security
Secure Access Control
Secure Authentication of Accessories and Peripherals
Bus Type I2C
Memory Type EEPROM
Memory Size 2K x 1
Deep Cover Yes
Oper. Temp. (°C) -40 to +85
Package/Pins TDFN/6
Budgetary
Price (See Notes)
0.94
View More

Simplified Block Diagram

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .

Parameters

Parametric specs for Secure Authenticators
Crypto Engine Symmetric
End Equipment Access Control
Asset Tracking
IP Protection
Identification Systems
Medical Sensor Authentication and Calibration
PCB ID and Authentication
Print Cartridge Authentication
Printer Cartridge Configuration and Monitoring
Rack Card Security
Secure Access Control
Secure Authentication of Accessories and Peripherals
Bus Type I2C
Memory Type EEPROM
Memory Size 2K x 1
Deep Cover Yes
Oper. Temp. (°C) -40 to +85
Package/Pins TDFN/6
Budgetary
Price (See Notes)
0.94

Key Features

  • Robust Countermeasures Protect Against Security Attacks
    • Patented Physically Unclonable Function Secures Device Data
    • Actively Monitored Die Shield Detects and Reacts to Intrusion Attempts
    • All Stored Data Cryptographically Protected from Discovery
  • Efficient Secure Hash Algorithm Authenticates Peripherals
    • FIPS 202-Compliant SHA-3 Algorithm for Challenge/Response Authentication
    • FIPS 198-Compliant Keyed-Hash Message Authentication Code (HMAC)
    • TRNG with NIST SP 800-90B Compliant Entropy Source
  • Supplemental Features Enable Easy Integration into End Applications
    • 17-Bit One-Time Settable, Nonvolatile Decrement Only Counter with Authenticated Read
    • One GPIO Pin with Optional Authentication Control
    • 2Kb of EEPROM for User Data, Key, and Control Registers
    • Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
    • Operating Range: 3.3V ±10%, -40°C to +85°C
    • 6-Pin TDFN-EP Package (3mm x 3mm)
    • I2C Communication, up to 1MHz

Applications/Uses

  • Accessory and Peripheral Secure Authentication
  • Authentication of Medical Sensors and Tools
  • IoT Node Crypto-Protection
  • Printer Cartridge Identification and Authentication
  • Secure Management of Limited Use Consumables

Description

The DS28C50 secure authenticator combines FIPS202-compliant secure hash algorithm (SHA-3) challenge and response authentication with Maxim’s patented ChipDNA™ technology, a physically unclonable function (PUF) to provide a cost-effective solution with the ultimate protection against security attacks. The ChipDNA implementation utilizes the random variation of semiconductor device characteristics that naturally occur during wafer fabrication. The ChipDNA circuit generates a unique output value that is repeatable over time, temperature, and operating voltage. Attempts to probe or observe ChipDNA operation modifies the underlying circuit characteristics, thus preventing discovery of the unique value used by the chip cryptographic functions. The DS28C50 utilizes the ChipDNA output as key content to cryptographically secure all device-stored data. With ChipDNA capability, the device provides a core set of cryptographic tools derived from integrated blocks including a SHA-3 engine, a FIPS/NIST compliant true random number generator (TRNG), 2Kb of secured EEPROM, a decrement-only counter and a unique 64-bit ROM identification number (ROM ID). The unique ROM ID is used as a fundamental input parameter for cryptographic operations and serves as an electronic serial number within the application. The DS28C50 communicates over a I2C network.

Download DS28C50 Jupyter Notebook ›

Simplified Block Diagram

DS28C50: Typical Application Circuit DS28C50: Typical Application Circuit Zoom icon

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .