Supplier eBooks

Maxim - Embedded Security Solutions

Issue link: https://resources.mouser.com/i/1442760

Contents of this Issue

Navigation

Page 16 of 22

17 | 17 | The DS28E38 DeepCover Secure ECDSA Authenticator is an ECDSA public key-based secure authenticator that incorporates Maxim's patented ChipDNA™ PUF technology. ChipDNA technology involves a physically unclonable function (PUF) that enables the DS28E38 to deliver cost-effective protection against invasive physical attacks. Features • ECDSA-P256 Challenge/Response Authentication • ChipDNA PUF Secures Device Data • Decrement-Only Counter with ECDSA Authenticated Read • Operates From Contact Efficient 1-Wire Interface Applications • Authentication of Medical Sensors and Tools • Secure Management of Limited Use Consumables • IoT Node and Peripheral Authentication mouser.com/maxim-ds28e38-authenticator/ Maxim DS28E38 DeepCover ® Secure ECDSA Authenticator Maxim DS28E50 DeepCover ® Secure SHA-3 Authenticator with ChipDNA PUF The DS28E50 DeepCover SHA3-256 authenticator integrates a set of cost-effective symmetric key-based security functions to protect and securely manage end products. Additionally, ChipDNA PUF is designed in to protect the device against invasive attacks that discover and compromise a SHA3 key or other protected sensitive data. Features • Provides Latest SHA3-256-Based Bidirectional Authentication • Operates From Contact Efficient 1-Wire Interface • User-Programmable EEPROM with Optional SHA3 Protection • Outputs NIST Quality TRNG Values for Host System Security Functions Applications • Sensor and Peripheral Secure Authentication • Counterfeit Prevention • Use Management of Limited-Life Peripherals • Secure Control of Accessories with SHA3 Authenticated GPIO mouser.com/maxim-DS28E50/ Cybercrime is costly, but many companies still aren't considering design security until it's too late. In the fall of 2016, a massive internet outage brought down the likes of Amazon, Twitter, Netflix, and PayPal. The culprit? Closed- circuit television (CCTV) video cameras and DVRs hacked by a botnet based on the Mirai malware strain. Earlier this year, WikiLeaks made headlines when it revealed that it had internal Central Intelligence Agency (CIA) documents showing that it had uncovered a way to access Apple and Android smartphones, Samsung SmartTVs, and internet-enabled cars. With increasing regularity, we hear stories about everyday products being attacked—products that we assume would be safe. Think baby monitors, toys, security cameras (ironically), and even medical devices. In some cases, the attacks were conducted by "white hat" (or ethical) hackers, simply to determine if it is possible. In other cases, the breaches stem from more nefarious sources. Hacking was even a major storyline in the most recent U.S. presidential election. A Juniper Research report estimates that data breaches of traditional computing devices could grow the cost of cybercrime to $2.1 trillion by 2019. The report notes that most of these breaches come from existing IT and network infrastructure. Add to this the growing number of smart, connected devices— particularly products that deal in sensitive, personal data—and the propensity for havoc and harm grows that much larger and more dangerous. Forrester ® believes that the most vulnerable will see a large-scale Internet of Things (IoT) security breach. The analyst firm believes that the most vulnerable areas are those that have quickly adopted IoT technologies: " " Why Hardware-Based Design Security is Essential for Every Application Gregory Guez, Executive Director, Embedded Security, Maxim Integrated

Articles in this issue

Links on this page

view archives of Supplier eBooks - Maxim - Embedded Security Solutions