Authenticator secures IoT nodes
Public-key and secret-key crypto functions add a level of IP and device integrity to industrial, medical, and IoT products, says Maxim Integrated, as it unveils the DS28C36 DeepCover secure authenticator.
It provides a targeted set of asymmetric-key and symmetric-key cryptographic tools in a compact package. Asymmetric public-key features are supported with the P256 based elliptic curve cryptography (ECC) algorithm and symmetric secret-key with SHA-256. It monitors or limits peripheral usage with authenticated EEPROM settings and a 17bit decrement-only counter
Two authenticated GPIO pins have optional secure state control and level sensing as well as the ability to enhance secure download/boot features. There are also countermeasures to protect against invasive and non-invasive security attacks.
It safeguards critical system data by only making accessible stored sensitive data through encrypted R/W with a key established through a Diffie-Hellman (ECDH) based protocol.
End applications include bi-directional authentication, secure storage of system data (such as system crypto keys), verification of system-critical data, secure boot, and end product usage control. For applications where the host system microcontroller has insufficient computing resources for ECC algorithms or lacks required secure storage for a SHA-256 symmetric key, the companion DS2476 co-processor, can be used.
The authenticator is offered in a 3.0 x 3.0mm TDFN package, and operates from -40 to +85 degrees C.