Supplier eBooks

Maxim - Embedded Security Solutions

Issue link: https://resources.mouser.com/i/1442760

Contents of this Issue

Navigation

Page 21 of 22

An example of asymmetric key authentication can be realized using a digital signature computed with the elliptic curve digital signature algorithm (ECDSA) (digital signature algorithm (DSA) and Rivest-Shamir-Adleman (RSA)-DSA are other examples). ECDSA uses elliptic curve cryptography, in which the bit size of the key is equivalent in terms of strength to twice the size of a symmetric cipher (256-bit ECDSA is as secure as a 128-bit Advanced Encryption Standard (AES)). With ECDSA, the public key is only used for verifying; there's no need to protect the public key from counterfeiters or hackers. It's only critical to protect the private key. For systems where it's difficult or even impossible to secure host keys, ECDSA asymmetric authentication provides very strong security. It can also be ideal if you're using multiple contract manufacturers, or if you license your product to your customers. 22 | 22 | The DeepCover Secure Authenticator (DS28E25) combines crypto-strong, bidirectional, secure challenge-and- response authentication functionality with an implementation based on the FIPS 180 Secure Hash Algorithm (SHA-256). Features • Symmetric Key-Based Bidirectional Secure Authentication Model • Strong Authentication with a High Bit Count, User Programmable Secret, and Input Challenge • 4Kb user-programmable EEPROM Applications • Secure Usage Control • Authenticated Operating Parameters mouser.com/maxim-deepcover-sha256/ Maxim DS28E25 DeepCover ® Secure Authenticator with 1-Wire ® SHA-256 Maxim MAXQ1061/MAXQ1062 DeepCover ® Cryptographic Controller The MAXQ1061/MAXQ1062 DeepCover Cryptographic Controllers is an embedded security solution that supports highly secure key storage. The MAXQ1061 cloaks sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible. Features • Symmetric-key: AES-128/-256 (ECB, CBC, CCM) • Asymmetric-key: ECC NIST P-256, -521, -384 • Secure Hash: SHA-256, -384, -512 Applications • Internet of Things (IoT) • Portable Medical Devices • Certificate Distribution and Management • See Video: Safeguard Your Connected Products with Turnkey Security. mouser.com/maxim-integrated-maxq1061- controller/

Articles in this issue

Links on this page

view archives of Supplier eBooks - Maxim - Embedded Security Solutions