Datasheet4U Logo Datasheet4U.com

DS28E50 Datasheet DeepCover Secure SHA-3 Authenticator

Manufacturer: Maxim Integrated (now Analog Devices)

General Description

The DS28E50 secure authenticator combines FIPS202compliant secure hash algorithm (SHA-3) challenge and response authentication with Maxim’s patented ChipDNA™ technology, a physically unclonable function (PUF) to provide a cost-effective solution with the ultimate protection against security attacks.

The ChipDNA implementation utilizes the random variation of semiconductor device characteristics that naturally occur during wafer fabrication. The ChipDNA circuit generates a unique output value that is repeatable over time, temperature, and operating voltage. Attempts to probe or observe ChipDNA operation modifies the underlying circuit characteristics thus preventing discovery of the unique value used by the chip cryptographic functions. The DS28E50 utilizes the ChipDNA output as key content to cryptographically secure all device-stored data. With ChipDNA capability, the device provides a core set of cryptographic tools derived from integrated blocks including a SHA-3 engine, a FIPS/ NIST compliant true random number generator (TRNG), 2Kb of secured EEPROM, a decrement-only counter and a unique 64-bit ROM identification number (ROM ID).

 The unique ROM ID is used as a fundamental input parameter for cryptographic operations and serves as an electronic serial number within the application. The DS28E50 communicates over the single-contact 1-Wire® bus at both standard and overdrive speeds.

Overview

Request DS28E50 Security User Guide EVALUATION KIT AVAILABLE Click here for production status of specific part numbers.

Key Features

  • Robust Countermeasures Protect Against Security Attacks.
  • Patented Physically Unclonable Function Secures Device Data.
  • Actively Monitored Die Shield Detects and Reacts to Intrusion Attempts.
  • All Stored Data Cryptographically Protected from Discovery.
  • Efficient Secure Hash Algorithm Authenticates Peripherals.
  • FIPS 202-Compliant SHA-3 Algorithm for Challenge/Response Authentication.
  • FIPS 198-Compliant Keyed-Hash Message Authenti.