DS28C36
Info: : PRODUCTION
searchIcon
cartIcon

DS28C36

DeepCover Secure Authenticator

Show More showmore-icon

Provides Affordable Elliptic-Curve Public-Key Authentication Security to Protect Your Development Investment

Info: : PRODUCTION tooltip
Info: : PRODUCTION tooltip
Part Details
Part Models 4
1ku List Price Starting From $1.41
Features
  • ECC-256 Compute Engine
    • FIPS 186 ECDSA P256 Signature and Verification
    • ECDH Key Exchange with Authentication Prevents Man-in-the-Middle Attacks
    • ECDSA Authenticated R/W of Configurable Memory
  • FIPS 180 SHA-256 Compute Engine
    • HMAC
  • SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
  • Two GPIO Pins with Optional Authentication Control
    • Open-Drain, 4mA/0.4V
    • Optional SHA-256 or ECDSA Authenticated On/Off and State Read
    • Optional ECDSA Certificate to Set On/Off after Multiblock Hash for Secure Boot
  • RNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
  • Optional Chip Generated Pr/Pu Key Pairs for ECC Operations
  • 17-Bit One-Time Settable, Nonvolatile Decrement-Only Counter with Authenticated Read
  • 8Kbits of EEPROM for User Data, Keys, and Certificates
  • Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
    • Optional Input Data Component to Crypto and Key Operations
  • I2C Communication Up to 1MHz
  • Operating Range: 2.2V to 3.63V, -40°C to +85°C
  • 6-Pin TDFN Package
Additional Details
show more Icon

The DS28C36 is a DeepCover® secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (RNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).

The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.

Two GPIO pins can be independently operated under command control and include configurability supporting authenticated and nonauthenticated operation including an ECDSA-based crypto-robust mode to support secure-boot of a host processor.

DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.

Applications

  • IoT Node Crypto-Protection
  • Accessory and Peripheral Secure Authentication
  • Secure Storage of Cryptographic Keys for a Host Controller
  • Secure Boot or Download of Firmware and/or System Parameters
Complete documentation is available upon completion of a Non-Disclosure Agreement (NDA). To request an NDA, click here.
Part Models 4
1ku List Price Starting From $1.41

close icon
Documentation

Documentation

Video

Part Model Pin/Package Drawing Documentation CAD Symbols, Footprints, and 3D Models
DS28C36BQ+T
  • HTML
  • HTML
DS28C36BQ+U
  • HTML
  • HTML
DS28C36Q+T
  • HTML
  • HTML
DS28C36Q+U
  • HTML
  • HTML
Software & Part Ecosystem

Software & Part Ecosystem

Can't find the software or driver you need?

Request a Driver/Software
Evaluation Kit

Evaluation Kits 3

reference details image

MAXAUTHDEMO

DeepCover Secure Authenticator Demonstration Kit

zoom

MAXAUTHDEMO

DeepCover Secure Authenticator Demonstration Kit

DeepCover Secure Authenticator Demonstration Kit

Features and Benefits

  • USB 2.0 Connected Hardware for Simple Setup and Operation
  • Secure Authenticator Hardware Module for Use Case Demonstration
  • Web-Based GUI for Step-by-Step Explanation of Secure Authenticator Use Scenario

Product Detail

The MAXAUTHDEMO demonstrates use case examples for DeepCover® Secure Authenticators. It comprises hardware (as pictured) that is operated from USB 2.0 and a web-based GUI to demonstrate how the functional capabilities of Maxim’s Secure Authenticators are used in various end equipment scenarios. The GUI operates from a web browser such as Chrome™.

Part Application
MAXAUTHDEMO1 Asymmetric ECDSA and symmetric SHA-256 operation of DS28C36
MAXAUTHDEMO2 Asymmetric ECDSA operation of DS28E38

Applications

  • Counterfeit Prevention
  • IoT Device Authenticity and Message Integrity
  • Product Quality and Safety
  • Secure Download/Boot
  • Use/Feature Control

DS9481P-300

USB-to-1-Wire/I2C Adapter

zoom

DS9481P-300

USB-to-1-Wire/I2C Adapter

USB-to-1-Wire/I2C Adapter

Features and Benefits

  • Driver Support for Windows 10, Windows 7Operating Systems
  • 1-Wire/I2C USB Adapter Creates a Virtual COM Porton Windows, Linux, and Mac Operating Systems
  • Emulates the DS2480B Command Set
  • 3.3V Read/Write Operation to 1-Wire
  • Supports Standard and Overdrive 1-WireCommunication
  • Strong Pullup to 3.3V Provides the Additional CurrentRequired for 1-Wire EEPROM, EnvironmentalSensors, and Cryptographic Devices
  • 1-Wire Active Pullup Accommodates Long Lines
  • 3.3V I2C Operation with SDA and SCL Pullups
  • Supports I2C Speeds of 100kHz and 400kHz
  • 6-Pin Female Interface
  • Fully Compliant with USB Specification v2.0

Product Detail

The DS9481P-300 is a USB-to-1-Wire®/I2C adapter for easy PC connectivity to 1-Wire and I2C devices. The adapter provides a 6-pin female connector with the signals to communicate with 1-Wire and I2C devices that support a 3.3V data I/O level. The DS9481P-300 driver runs on Windows®10, Windows 8, and Windows 7 operating systems, both 64-bit and 32-bit versions. The virtualized COM port provides a convenient communication interface.

reference details image

DS28C36EVKIT

Evaluation Kit for the DS28C36 and DS2476

zoom

DS28C36EVKIT

Evaluation Kit for the DS28C36 and DS2476

Evaluation Kit for the DS28C36 and DS2476

Features and Benefits

  • Demonstrates the Features of the DS28C36 DeepCover® Secure Authenticator
  • Demonstrates the Features of the DS2476 DeepCover Secure Coprocessor
  • I2C Communication is Logged to Aid Firmware Designers Understanding of the DS2476 and DS28C36
  • I2C-USB Adapter Creates a Virtual COM Port on Any PC
  • Fully Compliant with USB Specification v2.0
  • Software Runs on Windows 10, Windows 8, and Windows 7 for Both 64-Bit and 32-Bit Versions
  • 3.3V ±3% 1-Wire Operating Voltage
  • Convenient On-Board Test Points and TDFN Socket
  • Evaluation Software Available by Request
  • Proven PCB Layout
  • Fully Assembled and Tested

Product Detail

The DS28C36 evaluation system (EV system) provides the hardware and software necessary to evaluate the DS28C36 and DS2476. The EV system consists of five DS28C36/DS2476 devices in a 6-pin TDFN package, a DS9121AQ+ evaluation TDFN socket board, and a DS9481P-300# USB-to-I2C/1-Wire® adapter. The evaluation software runs on Windows® 10, Windows 8, and Windows 7 operating systems (64- and 32-bit versions). The EV system provides a handy user interface to exercise the features of the DS28C36 and DS2476.

Reference Designs

Reference Designs 1

maxrefdes155fig03

DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths

zoomopens a dialog

MAXREFDES155

DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths

DeepCover Embedded Security in an IoT: Public-Key Secured Data Paths

Features and Benefits

Features

  • Public-key infrastructure to authenticate nodes and messages
  • ECDSA-P256 public-key authentication
  • SHA-256 HMAC secret-key authentication
  • Securely controls on/off operation of IoT device endpoints
  • Demonstrates secure download for remote update of an IoT device configuration file
  • DeepCover secure key storage and protection
  • Wifi interface for communication to a web server

Competitive Advantages

  • Crypto-strong authentication
  • No need for secure-key storage memory on processor
  • Low-overhead performance for signed data between the web server and the mbed platform
View Detailed Reference Design external link

Design & Integration Tools

pdf icon

ZIP

2.19 M

Recently Viewed