DS28C36

PRODUCTION

DeepCover Secure Authenticator

Provides Affordable Elliptic-Curve Public-Key Authentication Security to Protect Your Development Investment

Part Details

  • ECC-256 Compute Engine
    • FIPS 186 ECDSA P256 Signature and Verification
    • ECDH Key Exchange with Authentication Prevents Man-in-the-Middle Attacks
    • ECDSA Authenticated R/W of Configurable Memory
  • FIPS 180 SHA-256 Compute Engine
    • HMAC
  • SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
  • Two GPIO Pins with Optional Authentication Control
    • Open-Drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA Authenticated On/Off and State Read
    • Optional ECDSA Certificate to Set On/Off after Multiblock Hash for Secure Boot
  • RNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
  • Optional Chip Generated Pr/Pu Key Pairs for ECC Operations
  • 17-Bit One-Time Settable, Nonvolatile Decrement-Only Counter with Authenticated Read
  • 8Kbits of EEPROM for User Data, Keys, and Certificates
  • Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
    • Optional Input Data Component to Crypto and Key Operations
  • I2C Communication Up to 1MHz
  • Operating Range: 2.2V to 3.63V, -40°C to +85°C
  • 6-Pin TDFN Package
DS28C36
DeepCover Secure Authenticator
Ask a Question

Documentation

Learn More

Software Resources

Can't find the software or driver you need?

Request a Driver/Software

Hardware Ecosystem

Parts Product Life Cycle Description
Secure Authenticators 1
DS2476 PRODUCTION DeepCover Secure Coprocessor
Modal heading
Add to myAnalog

Add product to the Products section of myAnalog (to receive notifications), to an existing project or to a new project.

Create New Project

Tools & Simulations

DeepCover® Security Lab

Open Tool

Reference Designs

maxrefdes155fig03
MAXREFDES155 Circuits from the lab

DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths

Features and Benefits

Features

  • Public-key infrastructure to authenticate nodes and messages
  • ECDSA-P256 public-key authentication
  • SHA-256 HMAC secret-key authentication
  • Securely controls on/off operation of IoT device endpoints
  • Demonstrates secure download for remote update of an IoT device configuration file
  • DeepCover secure key storage and protection
  • Wifi interface for communication to a web server

Competitive Advantages

  • Crypto-strong authentication
  • No need for secure-key storage memory on processor
  • Low-overhead performance for signed data between the web server and the mbed platform
MAXREFDES155
DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths

Latest Discussions

No discussions on DS28C36 yet. Have something to say?

Start a Discussion on EngineerZone®

Recently Viewed