Supplier eBooks

Maxim - Embedded Security Solutions

Issue link: https://resources.mouser.com/i/1442760

Contents of this Issue

Navigation

Page 19 of 22

Embedded security integrated circuits (ICs), such as security managers, secure microcontrollers, and secure authenticators, can ease the process of safeguarding entire systems, from each sensor node to the cloud. Such ICs can provide a turnkey security solution, delivering capabilities and features such as layers of advanced physical security, cryptographic algorithms, secure boot, encryption, secure key storage, and digital signature generation and verification. • Security managers that include advanced physical security with on-chip, non-imprinting memory can protect secret/ private keys and confidential data from even minor attempts at physical or environmental tampering • Secure microcontrollers with built-in cryptographic engines and secure boot loader can guard against threats such as cryptanalysis intrusions, physical tampering, and reverse engineering • Secure authenticators can be a cost-effective means to protect intellectual property (IP), prevent cloning, and authenticate peripherals, IoT devices, and endpoints For fast design prototyping, there are also a number of highly integrated, vetted reference designs available. Good reference designs include more than just the basics, offering resources such as Gerber files, evaluation and development tools, test data, drivers, and bill of materials (BOM). Using a reference design provides an opportunity to thoroughly evaluate the authentication and other security capabilities of the embedded security ICs integrated onto these boards. The MAX66242 provides dual RFID (ISO 15693) and I2C interfaces to functionality including SHA-256 authentication and 4kB of user-programmable EEPROM. The dual interface implementation enables contactless I/O to embedded electronics with the protection of SHA-256 security. The MAX66240 provides similar functionality without the I2C interface. Features • 13.56 MHz RFID/NFC tag interface for contactless operation • Fast NFC to I2C data transfers via 32-byte buffer • Bi-directional SHA-256 authentication • 4KB of user-programmable EEPROM Applications • Secure contactless interface to embedded electronics • Asset Tracking • Contactless medical peripheral authentication and calibration • System intellectual property protection mouser.com/maxim-max66242- authenticator/ Maxim MAX66242 DeepCover ® Secure Authenticator with RFID, I2C, and SHA-256 Maxim DS2476 DeepCover ® Secure Processor The DS2476 DeepCover Secure Processor is a secure ECDSA and HMAC SHA-256 coprocessor companion to the DS28C36. The coprocessor can compute any required HMACs or ECDSA signatures to do any operation on the DS28C36. Features • ECC-256 Compute Engine • FIPS 186 ECDSA P256 Signature and Verification • ECDSA Authenticated R/W of Configurable Memory Applications • Accessory and Peripheral Secure Authentication • loT Node Crypto-Protection • Secure Storage of Cryptographic Keys for a Host mouser.com/maxim-ds2476-processor/ 20 | 20 | Summary The regular stream of hacking headlines should be evidence enough that design security can't be overlooked. And when weighing software- versus hardware-based approaches, it's clear that implementing system safeguards via hardware provides a more robust option. Today's embedded security ICs can provide an easier, lower cost way to integrate your designs early on with layers of advanced security, support for cryptographic algorithms, tampering detection, and many other protections.

Articles in this issue

Links on this page

view archives of Supplier eBooks - Maxim - Embedded Security Solutions