DS28E50 DeepCover® Secure SHA3-256 Authentica

By Maxim Integrated 71

DS28E50 DeepCover® Secure SHA3-256 Authentica

Maxim's DS28E50 DeepCover secure hash algorithm 3 (SHA3-256) authenticator IC allows embedded systems designers to easily and cost-effectively integrate advanced crypto-strong authentication into their designs. With SHA3-256, the DS28E50 delivers the latest technology for challenge-and-response authentication, providing a strong defense against counterfeiting, unauthorized usage, and other application problems in a secure IC solution suited for teams with limited or no cryptography expertise.

Features

  • Cost-effective, crypto-strong security: the FIPS 202-compliant SHA3-256 implementation provides a cost-effective, less-complex way to implement highly advanced, secure challenge/response authentication to defend against counterfeiting and monitor or limit peripheral usage. ChipDNA PUF technology strongly protects all device-stored sensitive data from security attacks
  • Ease of implementation: single-contact, 1-Wire® communication simplifies interface to end application. The IC includes secured EEPROM for end-application data with multiple configurable and irreversible memory protection modes. No device-level firmware development is required (firmware is needed for the host-side microcontroller). In addition, a factory programming service is available for simplified secure key management
  • Tiny, low-power, rugged package: the IC requires just 3.3 V, operates from -40°C to +85°C, includes ±8 kV human-body model (HBM) electrostatic discharge (ESD) protection, and is housed in a 6-pin, 3 mm x 3 mm TDFN package
Applications
  • Authentication of medical sensors and tools
  • IoT node authentication
  • Peripheral authentication
  • Printer cartridge identification and authentication
  • Reference design license management
  • Secure management of limited use consumables

Categories

Top