An example of asymmetric key authentication can be realized
using a digital signature computed with the elliptic curve digital
signature algorithm (ECDSA) (digital signature algorithm (DSA) and
Rivest-Shamir-Adleman (RSA)-DSA are other examples). ECDSA
uses elliptic curve cryptography, in which the bit size of the key
is equivalent in terms of strength to twice the size of a symmetric
cipher (256-bit ECDSA is as secure as a 128-bit Advanced
Encryption Standard (AES)). With ECDSA, the public key is only
used for verifying; there's no need to protect the public key from
counterfeiters or hackers. It's only critical to protect the private
key. For systems where it's difficult or even impossible to secure
host keys, ECDSA asymmetric authentication provides
very strong security. It can also be ideal if you're using multiple
contract manufacturers, or if you license your product to
your customers.
22
| 22 |
The DeepCover Secure Authenticator
(DS28E25) combines crypto-strong,
bidirectional, secure challenge-and-
response authentication functionality
with an implementation based on
the FIPS 180 Secure Hash Algorithm
(SHA-256).
Features
• Symmetric Key-Based Bidirectional Secure
Authentication Model
• Strong Authentication with a High Bit Count, User
Programmable Secret, and Input Challenge
• 4Kb user-programmable EEPROM
Applications
• Secure Usage Control
• Authenticated Operating Parameters
mouser.com/maxim-deepcover-sha256/
Maxim DS28E25 DeepCover
®
Secure
Authenticator with 1-Wire
®
SHA-256
Maxim MAXQ1061/MAXQ1062
DeepCover
®
Cryptographic Controller
The MAXQ1061/MAXQ1062
DeepCover Cryptographic Controllers
is an embedded security solution that
supports highly secure key storage. The
MAXQ1061 cloaks sensitive data under
multiple layers of advanced physical
security to provide the most secure key
storage possible.
Features
• Symmetric-key: AES-128/-256 (ECB, CBC, CCM)
• Asymmetric-key: ECC NIST P-256, -521, -384
• Secure Hash: SHA-256, -384, -512
Applications
• Internet of Things (IoT)
• Portable Medical Devices
• Certificate Distribution and Management
• See Video: Safeguard Your Connected Products with
Turnkey Security.
mouser.com/maxim-integrated-maxq1061-
controller/