DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.
The DeepCover Secure Authenticator (DS28E25) combines secure challenge-and-response authentication functionality based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256) with 4Kb of user-programmable EEPROM. Additional secure memory holds a secret/key for SHA-256 operations. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. The SHA-256 message authentication code (MAC), which the DS28E25 generates, is computed from data in the user memory, the SHA-256 secret, a host controller random challenge, and the 64-bit ROM ID. A secure and low-cost factory-programming service is available to pre-program device data including the SHA-256 secret. The DS28E25 communicates over Maxim's single-contact 1-Wire® bus.Our Secure Drug Delivery video shows how Maxim security products can be used to authenticate remote drug delivery.
|Part Number||Crypto Engine||Applications||Memory Type||Memory Size||Bus Type||VSUPPLY|
|Deep Cover||Oper. Temp.|
|EEPROM||4K x 1||1-Wire||2.97 to 3.63||Yes||-40 to +85|
|See All Secure Authenticators (28)|
| Pricing Notes: |
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.
|Device||Fab Process||Technology||Sample size||Rejects||FIT at 25°C||FIT at 55°C|
|App Note||6391||Implementing Secure Authentication Without Being a Cryptography Expert|
|App Note||5991||Realizing Industry 4.0: Essential System Considerations|
|Sub-System Board||5822||Alcatraz (MAXREFDES34#): SHA-256 Secure Authentication Design|
|App Note||5803||Secure Your FPGA System Using a DeepCover Secure Authenticator|
|App Note||5779||Introduction to SHA-256 Master/Slave Authentication|
|Tutorial||5716||Hardware Security ICs Offer Large Security Returns at a Low Cost|
|App Note||5546||The Fundamentals of a SHA-256 Master/Slave Authentication System|
|Tutorial||5522||Industrial Systems Need the Added Protection of Security ICs|
|Tutorial||5518||Uptime Protects the Bottom Line|
|App Note||5507||Understanding the DS1WM Synthesizable 1-Wire Bus Master|
|Tutorial||5403||How to Build a 1-Wire® Evaluation Kit|
|Tutorial||4702||Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables|
|App Note||4132||Attachment Methods for the Electro-Mechanical 1-Wire Contact Package|
|App Note||3989||Add Control, Memory, Security, and Mixed-Signal Functions with a Single Contact|
|App Note||3675||Protect Your R&D Investment with Secure Authentication|