Supplier eBooks

Maxim - Embedded Security Solutions

Issue link: https://resources.mouser.com/i/1442760

Contents of this Issue

Navigation

Page 5 of 22

secure Microcontrollers with tamper-proof electrically erasable programmable read-only memory (EEPROM) are available. The DeepCover ® Security Framework is a software solution that protects payment terminals and Internet of Things (IoT) devices from both local and remote attacks, even if weaknesses are exploited in the communication stack, by creating a trustworthy environment on an Arm ® Cortex ® -M open platform. DeepCover Embedded Security solutions easily protect an entire system. Secure device authentication, secure boot, and robust cryptography ensure these platforms are trustworthy. DeepCover embedded security ICs with ChipDNA ™ PUF technology deliver strong protection against invasive physical attacks. Beyond silicon, Maxim provides reference schematics, drivers, middleware, communication stacks, and support to enable a fast time-to- market. A system-level approach guarantees a higher security level, including secure factory programming and key management. DeepCover Secure Authenticators integrate cryptography and advanced physical security to provide the ultimate low-cost Intellectual Property (IP) protection, clone prevention, and peripheral authentication. The core set of fixed-function crypto operations and secure key storage is supplemented with options including secure download/boot processing, protected nonvolatile memory for end application use, secure general-purpose input/output (GPIO), decrement-only counters, session key generation, true random number source, and encrypted read/write of stored data. Devices with the 1-Wire ® interface are ideal for connecting to nontraditional form factors such as printer cartridges, medical disposables, and battery packs. Secure authenticators with ChipDNA PUF technology, based on a physically unclonable function (PUF), provide an exponential increase in protection against invasive and reverse engineering attacks. In ChipDNA authenticators, the PUF circuit relies on the naturally occurring random analog characteristics of fundamental metal-oxide semiconductor field- effect transistor (MOSFET) devices to produce cryptographic keys, making it immune to all known invasive attack tools and capabilities. In addition to the protection benefits, ChipDNA simplifies or eliminates the need for secure IC key management. DeepCover Security Managers combine advanced hardware- based security with on-chip, non-imprinting memory to safeguard sensitive data, including secrets and private keys, from the slightest physical or environmental tampering. Designers of electronic devices face new challenges. Not only must they implement very robust security against sophisticated attacks, but they must also optimize their research and development efforts while keeping material costs low. Maxim understands that ICs alone cannot solve all a designer's challenges. Therefore, our ability to provide secure factory programming and key management brings great peace of mind to customers while making Maxim an unequaled provider in the industry. 6 | 6 | The DS28C36 DeepCover Secure Authenticator provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions and integrates a FIPS/NIST true random number generator (RNG). Features • FIPS 186 ECDSA P256 Signature and Verification • ECDH Key Exchange to Establish Shared Keys • ECDSA Authenticated R/W of Configurable Memory Applications • Accessory and Peripheral Secure Authentication • IoT Node Crypto-Protection • Secure Boot or Download of Firmware and/or System Parameters mouser.com/maxim-ds28c36-authenticator/ The MAXREFDES155 DeepCover Embedded Security Reference Design is built to authenticate and control a sensing node using elliptic-curve- based public-key cryptography with control and notification from a web server. Features • Public-key infrastructure to authenticate nodes and messages • ECDSA-P256 public-key authentication • SHA-256 HMAC secret-key authentication Applications • Authentication of Internet of Things (IoT) device nodes • Securely updating IoT or network connected device configuration data • Data authentication at all levels from sensor endpoint to web server mouser.com/maxim-maxrefdes155/ Maxim DS28C36 DeepCover Secure Authenticator Maxim MAXREFDES155 DeepCover Security Reference Design

Articles in this issue

Links on this page

view archives of Supplier eBooks - Maxim - Embedded Security Solutions