DS28E25
Info: : PRODUCTION
searchIcon
cartIcon

DS28E25

DeepCover Secure Authenticator with 1-Wire SHA-256 and 4Kb User EEPROM

Show More showmore-icon

Protect Your Development Investment with Crypto-Strong Authentication and Advanced Physical Security

Info: : PRODUCTION tooltip
Info: : PRODUCTION tooltip
Part Details
Part Models 8
1ku List Price Starting From $1.28
Features
  • Symmetric-Key-Based Bidirectional Secure Authentication Model Based on SHA-256
  • Dedicated Hardware-Accelerated SHA Engine for Generating SHA-256 MACs
  • Strong Authentication with a High Bit Count, User-Programmable Secret, and Input Challenge
  • 4096 Bits of User EEPROM Partitioned Into 16 Pages of 256 Bits
  • User-Programmable and Irreversible EEPROM Protection Modes Including Authentication, Write and Read Protect, and OTP/EPROM Emulation
  • Unique, Factory-Programmed 64-Bit Identification Number
  • Single-Contact 1-Wire Interface Communicates with Host at Up to 76.9kbps
  • Operating Range: 3.3V ±10%, -40°C to +85°C
  • Low-Power 5µA (typ) Standby
  • ±8kV HBM ESD Protection (typ)
  • 2-Pin SFN, 2-Pin TO-92, 6-Pin TDFN, and 6-Pin TSOC Packages
Additional Details
show more Icon

DeepCover™ embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.

The DeepCover Secure Authenticator (DS28E25) combines crypto-strong, bidirectional, secure challengeand- response authentication functionality with an implementation based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256). A 4Kb user-programmable EEPROM array provides nonvolatile storage of application data and additional protected memory holds a readprotected secret for SHA-256 operations and settings for user memory control. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. This unique ROM ID is used as a fundamental input parameter for cryptographic operations and also serves as an electronic serial number within the application. A bidirectional security model enables two-way authentication between a host system and slave-embedded DS28E25. Slave-to-host authentication is used by a host system to securely validate that an attached or embedded DS28E25 is authentic. Hostto-slave authentication is used to protect DS28E25 user memory from being modified by a nonauthentic host. The SHA-256 message authentication code (MAC), which the DS28E25 generates, is computed from data in the user memory, an on-chip secret, a host random challenge, and the 64-bit ROM ID. The DS28E25 communicates over the single-contact 1-Wire® bus at overdrive speed. The communication follows the 1-Wire protocol with the ROM ID acting as node address in the case of a multiple-device 1-Wire network.

Our Secure Drug Delivery video shows how Maxim security products can be used to authenticate remote drug delivery.

Applications

  • Authentication of Network-Attached Appliances
  • Key Generation and Exchange for Cryptographic Systems
  • Printer Cartridge ID/Authentication
  • Reference Design License Management
  • Secure Feature Setting for Configurable Systems
  • Sensor/Accessory Authentication and Calibration
  • System Intellectual Property Protection
Complete documentation is available upon completion of a Non-Disclosure Agreement (NDA). To request an NDA, click here.
Part Models 8
1ku List Price Starting From $1.28

close icon
Documentation

Documentation

Part Model Pin/Package Drawing Documentation CAD Symbols, Footprints, and 3D Models
DS28E25+
  • HTML
  • HTML
DS28E25+T
  • HTML
  • HTML
DS28E25G+T
  • HTML
  • HTML
DS28E25G+U
  • HTML
  • HTML
DS28E25P+
  • HTML
  • HTML
DS28E25P+T
  • HTML
  • HTML
DS28E25Q+T
  • HTML
  • HTML
DS28E25Q+U
  • HTML
  • HTML

Filter by Model

reset

Reset Filters

Part Models

Product Lifecycle

PCN

Apr 14, 2020

- 1998A

ASSEMBLY

DS28E25+

PRODUCTION

DS28E25+T

PRODUCTION

Jun 20, 2016

- 1612

ASSEMBLY

DS28E25Q+T

PRODUCTION

DS28E25Q+U

PRODUCTION

Filter by Model

reset

Reset Filters

Part Models

Product Lifecycle

PCN

Apr 14, 2020

- 1998A

arrow down

ASSEMBLY

DS28E25+

PRODUCTION

DS28E25+T

PRODUCTION

Jun 20, 2016

- 1612

arrow down

ASSEMBLY

DS28E25Q+T

PRODUCTION

DS28E25Q+U

PRODUCTION

Evaluation Kit

Evaluation Kits 1

DS28E25EVKIT

Evaluation System for the DS28E25 and DS2465

zoom

DS28E25EVKIT

Evaluation System for the DS28E25 and DS2465

Evaluation System for the DS28E25 and DS2465

Features and Benefits

  • EV Kit Contains
    • Five DS28E25 Devices in a TDFN-EP Package
    • One USB-to-I2C PC Adapter (DS9400#) Provides PC Connection
    • DS2465EVKIT# Evaluation Board Provides 1-Wire Interface and SHA-256 Coprocessor
    • One EV Board (DS9120Q+) with TDFN-EP Socket Provides Easy Chip Evaluation
  • USB-to-I2C Module Contains Prolific PL-2303HXD USB-to-UART Chip
    • Enumerates as a Virtual PC COM Port
    • Windows-Certified Logo USB Device Driver Available
    • Standard USB Cable Interface
  • EV Board Contains Convenient On-Board Test Points
  • Evaluation Software Will Be Provided Along with Full Evaluation Kit Data Sheet

Product Detail

The DS28E25 evaluation system (EV system) provides the hardware and software necessary to evaluate and program the DS28E25 DeepCover® Secure Authenticator. EV system operation requires a host PC for user-friendly evaluation.
This evaluation system includes a DS9400 USB-to-I2C PC adapter, a DS2465 EV board, a DS9120Q+ evaluation socket board for a TDFN DS28E25, and five DS28E25 sample devices in a TDFN package. The EV software runs on Windows® 8, Windows 7, Windows Vista®, and Windows XP® operating systems. Detailed instructions for downloading and installing software, as well as general EV system operation are included in the EV system data sheet; software and documentation are available at the link above.
Note: The DS2465 EV board and DS9400# subcomponents are not available for direct sale outside of evaluation systems. A data sheet specific to DS9400# is not available.

Reference Designs

Reference Designs 1

MAXREFDES34

SHA-256 Secure Authentication Design

zoomopens a dialog

MAXREFDES34

SHA-256 Secure Authentication Design

SHA-256 Secure Authentication Design

Features and Benefits

  • SHA-256 authentication
  • Single-contact 1-Wire interface
  • Example source code
  • Pmod-compatible form factor

Competitive Advantages

  • Crypto-strong authentication
  • Single pin count interface
  • Fast performance with hardware acceleration

Applications

  • Counterfeit protection
  • Peripheral authentication
  • IP protection
  • License and feature management
View Detailed Reference Design external link

Design & Integration Tools

pdf icon

ZIP

87.93 K

Recently Viewed