Authenticator has cryptographic tools derived from asymmetric and symmetric security functions

20-10-2016 | Mouser Electronics | Semiconductors

Stocked by Mouser, the Maxim DS28C36 Deep Cover Secure Authenticator provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (RNG). The device also integrates 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID). The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.
ads_logo.png

By Electropages

Electropages is a trusted source of news and insights from the global electronics industry. With a dedicated team of experts and editors, Electropages delivers in-depth articles, product updates, and market trends across sectors such as embedded systems, IoT, connectors, and power solutions. Our mission is to empower engineers and professionals with the knowledge they need to innovate and succeed in a rapidly evolving technological landscape.