DS28EL22

DeepCover Secure Authenticator with 1-Wire SHA-256 and 2Kb User EEPROM

Protect Your Development Investment with Crypto-Strong Authentication and Advanced Physical Security


Please check latest availability status for a specific part variant.

Description

DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible. The DeepCover Secure Authenticator (DS28EL22) combines crypto-strong, bidirectional, secure challenge-and-response authentication functionality with an implementation based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256). A 2Kb user-programmable EEPROM array provides nonvolatile storage of application data and additional protected memory holds a read-protected secret for SHA-256 operations and settings for user memory control. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. This unique ROM ID is used as a fundamental input parameter for cryptographic operations and also serves as an electronic serial number within the application. A bidirectional security model enables two-way authentication between a host system and slave-embedded DS28EL22. Slave-to-host authentication is used by a host system to securely validate that an attached or embedded DS28EL22 is authentic. Host-to-slave authentication is used to protect DS28EL22 user memory from being modified by a nonauthentic host. The SHA-256 message authentication code (MAC), which the DS28EL22 generates, is computed from data in the user memory, an on-chip secret, a host random challenge, and the 64-bit ROM ID. The DS28EL22 communicates over the single-contact 1-Wire® bus at overdrive speed. The communication follows the 1-Wire protocol with the ROM ID acting as node address in the case of a multiple-device 1-Wire network.

Our Secure Drug Delivery video shows how Maxim security products can be used to authenticate remote drug delivery.

Key Features

  • Symmetric Key-Based Bidirectional Secure Authentication Model Based on SHA-256
  • Dedicated Hardware-Accelerated SHA Engine for Generating SHA-256 MACs
  • Strong Authentication with a High Bit Count, User-Programmable Secret, and Input Challenge
  • 2048 Bits of User EEPROM Partitioned Into 8 Pages of 256 Bits
  • User-Programmable and Irreversible EEPROM Protection Modes Including Authentication, Write and Read Protect, and OTP/EPROM Emulation
  • Unique, Factory-Programmed 64-Bit Identification Number
  • Single-Contact 1-Wire Interface Communicates with Host at Up to 76.9kbps
  • Operating Range: 1.8V ±5%, -40°C to +85°C
  • Low-Power 5µA (typ) Standby
  • ±8kV Human Body Model ESD Protection (typ)
  • 6-Pin TDFN Package

Applications/Uses

  • Authentication of Network-Attached Appliances
  • Key Generation and Exchange for Cryptographic Systems
  • Printer Cartridge ID/Authentication
  • Reference Design License Management
  • Secure Feature Setting for Configurable Systems
  • Sensor/Accessory Authentication and Calibration
  • System Intellectual Property Protection
Part NumberCrypto EngineApplicationsMemory TypeMemory SizeBus TypeVSUPPLY
(V)
Deep CoverOper. Temp.
(°C)
Package/PinsBudgetary
Price
See Notes
DS28EL22 Symmetric
IP Protection
Medical Consumable ID
PCB ID and Authentication
Print Cartridge Authentication
EEPROM2K x 11-Wire1.71 to 1.89Yes-40 to +85
TDFN/6
$1.15 @1k
See All Secure Authenticators (29)
Pricing Notes:
This pricing is BUDGETARY, for comparing similar parts. Prices are in U.S. dollars and subject to change. Quantity pricing may vary substantially and international prices may differ due to local duties, taxes, fees, and exchange rates. For volume-specific and version-specific prices and delivery, please see the price and availability page or contact an authorized distributor.


DS28EL22EVKIT: Evaluation System for the DS28EL22 and DS24L65
DS9481R-200: USB-to-1-Wire/iButton 1.8V Adapter
Device   Fab Process   Technology   Sample size   Rejects   FIT at 25°C   FIT at 55°C  

Note : The failure rates are summarized by technology and mapped to the associated material part numbers. The failure rates are highly dependent on the number of units tested.

Quality Management System >
Environmental Management System >

 
Status:
Package:
Temperature:

Related Resources


DS28C50
DeepCover I2C Secure SHA-3 Authenticator with ChipDNA PUF Protection

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates Peripherals
  • Supplemental Features Enable Easy Integration into End Applications

DS28C50
DeepCover I2C Secure SHA-3 Authenticator with ChipDNA PUF Protection

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates Peripherals
  • Supplemental Features Enable Easy Integration into End Applications

DS28C40
Deep Cover Automotive I²C Authenticator

  • ECC-P256 Compute Engine
  • SHA-256 Compute Engine
  • SHA-256 One-Time Pad Encrypted R/W of Configurable Memory Using an ECDH Established Key


Belle Isle 2020
05/29/2020 - 05/31/2020, Detroit, MI
2020 Detroit Grand Prix - Chevrolet Detroit Grand Prix presented by Lear Fast Facts The Chevrolet Detroit Grand Prix presented by Lear was hosted on Belle Isle, May 29 - 30 2020. The event featured the cars of the NTT IndyCar Series, the IMSA WeatherTech SportsCar Championship and the Trans Am Series presented by Pirelli. The weekend is collectively referred to as the Chevrolet Detroit Grand Prix presented by Lear and it once again featured the Chevrolet Dual in Detroit IndyCar doubleheader.

RSVP