Top

DeepCover Radiation Resistant 1-Wire Secure Authenticator

Provides Affordable Elliptic-Curve Public-Key Authentication Security to Protect Your Medical Devices

Product Details

Key Features

Applications/Uses

Parametric specs for Secure Authenticators
Crypto Engine Asymmetric
Symmetric
End Equipment IP Protection
Medical Consumable ID
Medical Sensor Authentication and Calibration
Bus Type 1-Wire
Memory Type EPROM
Memory Size 5K x 1
Deep Cover Yes
Oper. Temp. (°C) -40 to +50
Package/Pins TDFN/6
Budgetary
Price (See Notes)
1.28
View More

Simplified Block Diagram

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .

Parameters

Parametric specs for Secure Authenticators
Crypto Engine Asymmetric
Symmetric
End Equipment IP Protection
Medical Consumable ID
Medical Sensor Authentication and Calibration
Bus Type 1-Wire
Memory Type EPROM
Memory Size 5K x 1
Deep Cover Yes
Oper. Temp. (°C) -40 to +50
Package/Pins TDFN/6
Budgetary
Price (See Notes)
1.28

Key Features

  • High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
    • Resistant Up to 75kGy (kiloGray) of Radiation
    • One Time Programmable (OTP) 10kb of User Data, Keys, and Certificates
  • ECC-P256 Compute Engine
    • FIPS 186 ECDSA P256 Signature and Verification
    • ECDH Key Exchange for Session Key Establishment
    • ECDSA Authenticated R/W of Configurable Memory
  • SHA-256 Compute Engine
    • FIPS 180 MAC for Secure Download/Boot
    • FIPS 198 HMAC for Bidirectional Authentication and Optional GPIO Control
  • SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
  • One GPIO Pin with Optional Authentication Control
    • Open-Drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA Authenticated On/Off and State Read
    • Optional ECDSA Certificate to Set On/Off After Multiblock Hash for Secure Download
  • TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
  • Optional Chip Generated Pr/Pu Key Pairs for ECC Operations or Secrets for SHA256 Functions
  • Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
    • Optional Input Data Component to Crypto and Key Operations
  • Advanced 1-Wire Protocol Minimizes Interface to Just Single Contact
  • Operating Range: 3.3V ±10%, 0°C to +50°C
  • ±8kV HBM ESD Protection of 1-Wire IO Pin
  • 6-Pin, 3mm x 3mm TDFN

Applications/Uses

  • Accessory and Peripheral Secure Authentication
  • Medical Consumables Secure Authentication
  • Medical Tools/Accessories Identification and Calibration
  • Secure Boot or Download of Firmware and/or System Parameters
  • Secure Storage of Cryptographic Keys for Host Controllers

Description

The DS28E83 is a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS-compatible true random number generator (TRNG), 10Kb of secured OTP, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).

The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.

The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation, including an ECDSA-based crypto-robust mode to support secure boot of a host processor.

DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.

Simplified Block Diagram

DS28E83: Simplified Block Diagram DS28E83: Simplified Block Diagram Zoom icon

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .