Advertisement
Product Releases
Advertisement

Protect Electronic Devices with Secure Authenticator’s Strong Symmetric-Key Cryptography

Wed, 10/02/2013 - 2:49pm
WDD Staff

Designers can better protect their IP using the DeepCover Secure Authenticator from Maxim Integrated Products (Munich, Germany). The DS28C22 is a highly secure cryptographic solution for a host controller to authenticate peripherals or embedded designs, and it offers encrypted communication as an added benefit.

DeepCover embedded security solutions protect sensitive data with multiple layers of advanced physical security and provide highly secure storage of the authentication secret keys. Using the FIPS 180 based SHA-256 authentication algorithm, the DS28C22 combines crypto-strong, bidirectional, secure challenge-and-response authentication with small message encryption. Through bidirectional authentication, the host and the peripheral authenticate one another, protecting the IP in the peripheral from a non-authentic host trying to modify operation of the peripheral. The DS28C22 enables unprecedented security for many applications, including peripherals/disposables, sensors, network equipment, IP licensing, and industrial applications like programmable logic controllers (PLCs).

Key Advantages

  • Robust security protects IP from being compromised by counterfeiters or hackers: A bidirectional security model enables two-way authentication and encryption between a host system and slave-embedded DS28C22. Strong die-level protection securely stores the authentication key.
  • Simple and total programmability: Includes 3K bits of user memory with four user-programmable modes of protection; SHA-256 option enables customers to securely control end-product features through data settings.
  • Added security with factory preprogramming: Maxim’s optional DS28C22 preprogramming service prevents supply chain vendors from compromising a solution; ensures no exposure of cryptographic keys.
  • Fast and secure crypto processing: DS28C22 includes a dedicated hardware-accelerated engine for SHA computations.

For more information please visit www.maximintegrated.com

Topics

Advertisement

Share this Story

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading