Hero Banner

New Products

NPI Body

IOT security solutions

MAXIM is No.1 security vendor in World Market, MAXIM  have MD5、SHA-1、SHA-256、AES、DES、3DES、EC、ECDSA, RSA and all of the Crypto Engine products. MAXIM and AVNET can great support this customer.

The DS28C36 is a DeepCover® secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (RNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID)


Key Features

  • ECC-256 compute engine
    • FIPS 186 ECDSA P256 signature and verification
    • ECDH key exchange with authentication prevents Man-in-the-Middle attacks
    • ECDSA authenticated R/W of configurable memory
  • FIPS 180 SHA-256 compute engine
    • HMAC
  • SHA-256 OTP (One-Time Pad) encrypted R/W of configurable memory through ECDH established key
  • Two GPIO pins with optional authentication control
    • Open-drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA authenticated on/off and state read
    • Optional ECDSA certificate to set on/off after multiblock hash for secure boot
  • RNG with NIST SP 800-90B compliant entropy source with function to read out
  • Optional chip generated Pr/Pu key pairs for ECC operations
  • 17-Bit One-Time settable, nonvolatile decrement-only counter with authenticated read
  • 8Kbits of EEPROM for user data, keys, and certificates
  • Unique and unalterable factory programmed 64-Bit identification number (ROM ID)
    • Optional input data component to crypto and key operations
  • I2C communication up to 1MHz
  • Operating range: 2.2V to 3.63V, -40°C to +85°C
  • 6-Pin TDFN package


Applications

  • Accessory and peripheral secure authentication
  • IoT Node Crypto-Protection
  • Secure boot or download of firmware and/or system parameters
  • Secure storage of cryptographic keys for a host Controller


Block diagram

 

Body Content Spots

Supplier Logo

Content Spots

Newsletter

Subscribe for Online Delivery

SIGNUP