先頭に戻る

DeepCover Automotive Secure Coprocessor

Ensure Vehicle Safety and Reliability by Authenticating Automotive Components

製品の詳細

主な特長

Parametric specs for Secure Authenticators
Crypto Engine Asymmetric, Symmetric
End Equipment Automotive Secure Authentication
IP Protection
IoT Node Crypto-Protection
Secure Authentication of Accessories and Peripherals
Secure Boot or Download
Bus Type I2C
Memory Type OTP
Memory Size 6 Kb
Deep Cover Yes
Oper. Temp. (°C) -40°C to +125°C
Package/Pins TDFN/10
Budgetary
Price (See Notes)
1.31
非表示にする

簡易ブロック図

Technical Docs

サポートとトレーニング

技術質問への回答についてはナレッジベースで検索ください。

絞り込まれた検索

マキシムでは、お客様の技術的質問にお答えするため、アプリケーションエンジニアの専任チームも配置しています。 サポートセンター をご利用ください。

サンプルについて:
サンプルは、外部のADI Sample Siteでのご注文となります。選択したパーツはSample Siteログイン後、カートに引き継がれます。Sample Siteを初めて使用する際は、アカウント登録をお願いいたします。Sample Siteに関するご質問は、SampleSupport@analog.comまでお問合せください。

パラメーター

Parametric specs for Secure Authenticators
Crypto Engine Asymmetric, Symmetric
End Equipment Automotive Secure Authentication
IP Protection
IoT Node Crypto-Protection
Secure Authentication of Accessories and Peripherals
Secure Boot or Download
Bus Type I2C
Memory Type OTP
Memory Size 6 Kb
Deep Cover Yes
Oper. Temp. (°C) -40°C to +125°C
Package/Pins TDFN/10
Budgetary
Price (See Notes)
1.31

主な特長

  • HW Accelerator Offloads ECDSA and SHA-256 Computations from Host Processor
    • FIPS 186 ECDSA P-256 Signature and Verification
    • ECDH Key Exchange for Session Key Establishment
    • ECDSA-Authenticated R/W of Configurable Memory
    • FIPS 180 HMAC for Bidirectional Authentication
  • SHA-256 One-Time Pad Encrypted R/W of Configurable Memory Using an ECDH Established Key
  • One GPIO Pin with Optional Authentication Control
    • Open Drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA-Authenticated On/Off and State Read
    • Optional ECDSA Certificate to Set On/Off after Multiblock Hash for Secure Boot
  • TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
  • Optional Chip-Generated Pr/Pu Key Pairs for ECC Operations
  • 6Kb of One-Time Programmable (OTP) Memory for User Data, Keys, and Certificates
  • Unique and Unalterable, Factory-Programmed, 64-Bit Identification Number (ROM ID)
    • Optional Input Data Component to Crypto and Key Operations
  • I2C Communication up to 1MHz
  • 3.3V ±10%, -40°C to +125°C Operating Range
  • 10-Pin, 3mm x 3mm, Side-Wettable TDFN Package
  • AEC-Q100 Grade 1

アプリケーション/用途

  • Automotive Secure Authentication
  • Identification and Calibration Automotive of Parts/Tools/Accessories
  • IoT Node Crypto-Protection
  • Secure Authentication of Accessories and Peripherals
  • Secure Boot or Download of Firmware and/or System Parameters
  • Secure Storage of Cryptographic Keys for a Host Controller

説明

The DS2478 is a DeepCover® secure ECDSA and HMAC SHA-256 coprocessor companion to the DS28E40 or DS28C40. The coprocessor can compute any required HMACs or ECDSA signatures to do any operation on the DS28E40 or DS28C40. The DS2478 provides a core set of cryptographic tools derived from integrated asymmetric (ECC P-256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (TRNG), 6Kb of secured one-time-programmable (OTP) memory, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).

The ECC public/private key capabilities operate from the NIST-defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are flexibly used in conjunction with ECDSA operations or independently for multiple HMAC functions.

The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation including an ECDSA-based crypto-robust mode to support secure-boot of a host processor. This secure-boot method can also be used to enable the coprocessor functions.

DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented, including an active die shield, encrypted storage of keys, and algorithmic methods.

簡易ブロック図

DS2478:簡易ブロックダイアグラム DS2478:簡易ブロックダイアグラム Zoom icon

Technical Docs

サポートとトレーニング

技術質問への回答についてはナレッジベースで検索ください。

絞り込まれた検索

マキシムでは、お客様の技術的質問にお答えするため、アプリケーションエンジニアの専任チームも配置しています。 サポートセンター をご利用ください。

サンプルについて:
サンプルは、外部のADI Sample Siteでのご注文となります。選択したパーツはSample Siteログイン後、カートに引き継がれます。Sample Siteを初めて使用する際は、アカウント登録をお願いいたします。Sample Siteに関するご質問は、SampleSupport@analog.comまでお問合せください。