Product Details
DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.
The DeepCover Secure Authenticator (DS28E25) combines secure challenge-and-response authentication functionality based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256) with 4Kb of user-programmable EEPROM. Additional secure memory holds a secret/key for SHA-256 operations. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. The SHA-256 message authentication code (MAC), which the DS28E25 generates, is computed from data in the user memory, the SHA-256 secret, a host controller random challenge, and the 64-bit ROM ID. A secure and low-cost factory-programming service is available to pre-program device data including the SHA-256 secret. The DS28E25 communicates over Maxim's single-contact 1-Wire® bus.
Our Secure Drug Delivery video shows how Maxim security products can be used to authenticate remote drug delivery.Key Features
- Symmetric-Key-Based Bidirectional Secure Authentication Model Based on SHA-256
- Sophisticated Die-Level Methods and Circuits for Tamper Protection of Sensitive Data and Signals
- Dedicated Hardware-Accelerated SHA Engine for Generating SHA-256 MACs
- Strong Authentication with a High Bit Count, User-Programmable Secret, and Input Challenge
- 4096 Bits of User EEPROM Partitioned Into 16 Pages of 256 Bits
- User-Programmable and Irreversible EEPROM Protection Modes Including Authentication, Write and Read Protect, and OTP/EPROM Emulation
- Unique, Factory-Programmed 64-Bit Identification Number
- Single-Contact 1-Wire Interface Communicates with Host at Up to 76.9kbps
- Operating Range: 3.3V ±10%, -40°C to +85°C
- ±8kV HBM ESD Protection (typ)
- 2-Pin SFN, 2-Pin TO-92, 6-Pin TDFN, and 6-Pin TSOC Packages
Applications/Uses
- Identification and authentication of consumables
- Reference Design License Management
- Sensor/Accessory Authentication and Calibration
- System Intellectual Property Protection
Crypto Engine | Symmetric |
Applications | IP Protection Medical Consumable ID PCB ID and Authentication Print Cartridge Authentication Rack Card Security |
Bus Type | 1-Wire |
Memory Type | EEPROM |
Memory Size | 4K x 1 |
Deep Cover | Yes |
Oper. Temp. (°C) | -40 to +85 |
Package/Pins | SFN/2 TDFN/6 TO92/2 TO92/3 TSOC/6 |
Budgetary Price (See Notes) | $1.03 @1k |
Technical Docs
Click any title below to view the detail page where available.
Description
Features
- EV Kit Contains
- Five DS28E25 Devices in a TDFN-EP Package
- One USB-to-I2C PC Adapter (DS9400#) Provides PC Connection
- DS2465EVKIT# Evaluation Board Provides 1-Wire Interface and SHA-256 Coprocessor
- One EV Board (DS9120Q+) with TDFN-EP Socket Provides Easy Chip Evaluation
- USB-to-I2C Module Contains Prolific PL-2303HXD USB-to-UART Chip
- Enumerates as a Virtual PC COM Port
- Windows-Certified Logo USB Device Driver Available
- Standard USB Cable Interface
- EV Board Contains Convenient On-Board Test Points
- Evaluation Software Will Be Provided Along with Full Evaluation Kit Data Sheet
Programming Secure Authenticators
![]() | SIMULATION MODELS DS28E25 IBIS Model | Download |
Support & Training
Search our knowledge base for answers to your technical questions.
Filtered SearchOur dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal
Parameters
Crypto Engine | Symmetric |
Applications | IP Protection Medical Consumable ID PCB ID and Authentication Print Cartridge Authentication Rack Card Security |
Bus Type | 1-Wire |
Memory Type | EEPROM |
Memory Size | 4K x 1 |
Deep Cover | Yes |
Oper. Temp. (°C) | -40 to +85 |
Package/Pins | SFN/2 TDFN/6 TO92/2 TO92/3 TSOC/6 |
Budgetary Price (See Notes) | $1.03 @1k |
Key Features
- Symmetric-Key-Based Bidirectional Secure Authentication Model Based on SHA-256
- Sophisticated Die-Level Methods and Circuits for Tamper Protection of Sensitive Data and Signals
- Dedicated Hardware-Accelerated SHA Engine for Generating SHA-256 MACs
- Strong Authentication with a High Bit Count, User-Programmable Secret, and Input Challenge
- 4096 Bits of User EEPROM Partitioned Into 16 Pages of 256 Bits
- User-Programmable and Irreversible EEPROM Protection Modes Including Authentication, Write and Read Protect, and OTP/EPROM Emulation
- Unique, Factory-Programmed 64-Bit Identification Number
- Single-Contact 1-Wire Interface Communicates with Host at Up to 76.9kbps
- Operating Range: 3.3V ±10%, -40°C to +85°C
- ±8kV HBM ESD Protection (typ)
- 2-Pin SFN, 2-Pin TO-92, 6-Pin TDFN, and 6-Pin TSOC Packages
Applications/Uses
- Identification and authentication of consumables
- Reference Design License Management
- Sensor/Accessory Authentication and Calibration
- System Intellectual Property Protection
Description
DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.
The DeepCover Secure Authenticator (DS28E25) combines secure challenge-and-response authentication functionality based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256) with 4Kb of user-programmable EEPROM. Additional secure memory holds a secret/key for SHA-256 operations. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. The SHA-256 message authentication code (MAC), which the DS28E25 generates, is computed from data in the user memory, the SHA-256 secret, a host controller random challenge, and the 64-bit ROM ID. A secure and low-cost factory-programming service is available to pre-program device data including the SHA-256 secret. The DS28E25 communicates over Maxim's single-contact 1-Wire® bus.
Our Secure Drug Delivery video shows how Maxim security products can be used to authenticate remote drug delivery.Technical Docs
Support & Training
Search our knowledge base for answers to your technical questions.
Filtered SearchOur dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal