Supplier eBooks

Maxim - Embedded Security Solutions

Issue link: https://resources.mouser.com/i/1442760

Contents of this Issue

Navigation

Page 15 of 22

16 | 16 | Figure 2: Common use cases for ChipDNA PUF technology. (Source: Maxim Integrated) preventing the discovery of the unique value used by the chip cryptographic functions. Similarly, more exhaustive reverse- engineering attempts are defeated due to the factory conditioning required to make the ChipDNA ™ circuitry operational. The per- device unique key is generated by the ChipDNA circuitry only when needed for cryptographic operations and is then instantaneously deleted. Most importantly, the ChipDNA key never resides statically in registers or memory, nor does it ever leave the electrical boundary of the IC. In addition to the protection benefits, ChipDNA simplifies or eliminates the need for secure IC key management. The ChipDNA-generated key can be used directly for functions such as: • Root key for derived key operations • Symmetric secret to encrypt/decrypt data stored in the nonvolatile memory of the secure IC • Private key for ECDSA signature generation • Private key for ECDH key establishment ChipDNA PUF Technology Use Cases Use case examples for ChipDNA embedded security PUF technology (Figure 2) include internal memory encryption, external memory encryption, and authentication key generation. DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection The DS28E50 secure authenticator combines FIPS202- compliant secure hash algorithm (SHA-3) challenge and response authentication with Maxim's patented ChipDNA™ technology, a physically unclonable function (PUF) to provide a cost-effective solution with the ultimate protection against security attacks. The ChipDNA implementation utilizes the random variation of semiconductor device characteristics that naturally occur during wafer fabrication. The ChipDNA circuit generates a unique output value that is repeatable over time, temperature, and operating voltage. Attempts to probe or observe ChipDNA operation modifies the underlying circuit characteristics thus preventing discovery of the unique value used by the chip cryptographic functions. The DS28E50 utilizes the ChipDNA output as key content to cryptographically secure all device-stored data. With ChipDNA capability, the device provides a core set of cryptographic tools derived from integrated blocks including a SHA-3 engine, a FIPS/ NIST-compliant true random number generator (TRNG), 2Kb of secured EEPROM, a decrement-only counter, and a unique 64-bit ROM identification number (ROM ID). The unique ROM ID is used as a fundamental input parameter for cryptographic operations and serves as an electronic serial number within the application. The DS28E50 communicates over the single-contact 1-Wire ® bus at both standard and overdrive speeds. The communication follows the 1-Wire protocol with the ROM ID acting as a node address in the case of a multidevice 1-Wire network. INTERNAL MEMORY ENCRYPTION CPU OR STATE MACHINE EXTERNAL MEMORY ENCRYPTION AUTHENTICATION KEY GENERATION ChipDNA™ KEY AES EEPROM OR FLASH CPU ChipDNA KEY AES EEPROM OR FLASH CPU OR STATE MACHINE ChipDNA PRIVATE KEY ECDSA EEPROM PUBLIC KEY + CERTIFICATE 1-WIRE INFC & CMD 64-BIT ROM ID BUFFER TRNG 2kb E2 ARRAY SHA3-256 IO ChipDNA C X C EXT PARASITE POWER USER MEMORY SHA3 SECRET DECREMENT COUNTER REGISTERS AUTHENTICATED GPIO PIO DS28E50 Figure 3: The DS28E50 offers cost-effective protection with SHA3-256 authentication, ChipDNA secured data, and 2kB EEPROM (Source: Maxim Integrated). Securely Manage Disposable Medical Accessories with Maxim DS28E36 and MAX66242 s V I D E O Watch a demonstration of the DS28E36 and MAX66242 secure authenticators in a medical stapler application to learn how to securely manage data, calibration and end use. The demonstration also uses the MAX66300 NFC/ RFID reader and PC software to emulate the medical procedure and perform patient identification and device authentication.

Articles in this issue

Links on this page

view archives of Supplier eBooks - Maxim - Embedded Security Solutions