DatasheetsPDF.com

DS28E40 Datasheet

Part Number DS28E40
Manufacturers Maxim Integrated
Logo Maxim Integrated
Description Deep Cover Automotive 1-Wire Authenticator
Datasheet DS28E40 DatasheetDS28E40 Datasheet (PDF)

Click here to ask about the production status of specific part numbers. DS28E40 Deep Cover Automotive 1-Wire Authenticator General Description The DS28E40 is a secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware-implemented cryptographic engines, the device integrates a FIPS/NIST True Random Number Generator (TRNG), 6Kb of One.

  DS28E40   DS28E40






Deep Cover Automotive 1-Wire Authenticator

Click here to ask about the production status of specific part numbers. DS28E40 Deep Cover Automotive 1-Wire Authenticator General Description The DS28E40 is a secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware-implemented cryptographic engines, the device integrates a FIPS/NIST True Random Number Generator (TRNG), 6Kb of One-Time Programmable (OTP) memory for user data, keys and certificates, one configurable General-Purpose Input/Output (GPIO), and a unique 64-bit ROM identification number (ROM ID). The ECC public/private key capabilities operate from the NIST-defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are usable flexibly either in conjunction with ECDSA operations or independently for multiple HashBased Message Authentication Code (HMAC) functions. The GPIO pin is operated under command control and is configurable enabling support of authenticated and nonauthenticated operation. The GPIO-authenticated operation supports ECDSA-based crypto-robust mode, enabling secure-boot of a host processor. DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key.


2022-06-20 : 2SK4098LS    2SK4097LS    2SK4096LS    2SK4091I    2SK4091D    2SK4089LS    DS28EL25    DS28E84    DS28E40    DS28E18   


@ 2014 :: Datasheetspdf.com ::
Semiconductors datasheet search & download site (Privacy Policy & Contact)