Overview
Features and Benefits
- High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
- Resistant Up to 75kGy (kiloGray) of Radiation
- One Time Programmable (OTP) 10kb of User Data, Keys, and Certificates
- ECC-P256 Compute Engine
- FIPS 186 ECDSA P256 Signature and Verification
- ECDH Key Exchange for Session Key Establishment
- ECDSA Authenticated R/W of Configurable Memory
- SHA-256 Compute Engine
- FIPS 180 MAC for Secure Download/Boot
- FIPS 198 HMAC for Bidirectional Authentication and Optional GPIO Control
- SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
- One GPIO Pin with Optional Authentication Control
- Open-Drain, 4mA/0.4V
- Optional SHA-256 or ECDSA Authenticated On/Off and State Read
- Optional ECDSA Certificate to Set On/Off After Multiblock Hash for Secure Download
- TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
- Optional Chip Generated Pr/Pu Key Pairs for ECC Operations or Secrets for SHA256 Functions
- Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
- Optional Input Data Component to Crypto and Key Operations
- Advanced 1-Wire Protocol Minimizes Interface to Just Single Contact
- Operating Range: 3.3V ±10%, 0°C to +50°C
- ±8kV HBM ESD Protection of 1-Wire IO Pin
- 6-Pin TDFN and 2-Pin SFN
Product Details
The DS28E83 is a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS-compatible true random number generator (TRNG), 10Kb of secured OTP, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).
The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.
The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation, including an ECDSA-based crypto-robust mode to support secure boot of a host processor.
DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.
APPLICATIONS
- Medical Consumables Secure Authentication
- Medical Tools/Accessories Identification and Calibration
- Accessory and Peripheral Secure Authentication
- Secure Storage of Cryptographic Keys for Host Controllers
- Secure Boot or Download of Firmware and/or System Parameters
Product Categories
Markets and Technologies
Product Lifecycle
Recommended for New Designs
This product has been released to the market. The data sheet contains all final specifications and operating conditions. For new designs, ADI recommends utilization of these products.
Evaluation Kits (2)
Documentation & Resources
-
Using 1-Wire for Flexible Electro-Mechanical Contact Applications3/1/2021
-
How Secure Authenticators and Coprocessors Can Simplify Cryptography8/3/2020
-
Cryptography: Planning for Threats and Countermeasures7/20/2020
-
Cryptography: Is a Hardware or Software Implementation More Effective?7/8/2020
-
Cryptography: A Closer Look at the Algorithms6/3/2020
-
Cryptography: Fundamentals of the Modern Approach5/29/2020
-
Cryptography: How It Helps in Our Digital World5/26/2020
-
Back to Basics: Secure Hash Algorithms6/13/2019
-
Secure Authentication for Medical Disposables4/5/2019
-
Easily Add Memory, Security, Monitoring, and Control to Medical Sensors and Consumables5/10/2010
-
Overview of 1-Wire Technology and Its Use6/19/2008
Tools & Simulations
Design Tools
Software Development
Design Resources
ADI has always placed the highest emphasis on delivering products that meet the maximum levels of quality and reliability. We achieve this by incorporating quality and reliability checks in every scope of product and process design, and in the manufacturing process as well. "Zero defects" for shipped products is always our goal.
Support & Discussions
Sample & Buy
Ordering FAQs
See our Ordering FAQs for answers to questions about online orders, payment options and more.
Buy Now Pricing
(**) Displayed Buy Now Price and Price Range is based on small quantity orders.
List Pricing
(*)The 1Ku list pricing shown is for BUDGETARY USE ONLY, shown in United States dollars (FOB USA per unit for the stated volume), and is subject to change. International prices may differ due to local duties, taxes, fees and exchange rates. For volume-specific price or delivery quotes, please contact your local Analog Devices, Inc. authorized distributor. Pricing displayed for Evaluation Boards and Kits is based on 1-piece pricing.
Lead Times
Please see the latest communication from our CCO regarding lead times.
Sampling
Selecting the Sample button above will redirect to the third-party ADI Sample Site. The part selected will carry over to your cart on this site once logged in. Please create a new account there if you have never used the site before. Contact SampleSupport@analog.com with any questions regarding this Sample Site.
Evaluation Boards
Pricing displayed is based on 1-piece.
Up to two boards can be purchased through Analog.com. To order more than two, please purchase through one of our listed distributors.
Pricing displayed is based on 1-piece. The USA list pricing shown is for budgetary use only, shown in United States dollars (FOB USA per unit), and is subject to change. International prices may vary due to local duties, taxes, fees and exchange rates.