DS28E83
RECOMMENDED FOR NEW DESIGNSDeepCover Radiation Resistant 1-Wire Secure Authenticator
Provides Affordable Elliptic-Curve Public-Key Authentication Security to Protect Your Medical Devices
- Part Models
- 3
- 1ku List Price
- Starting From $1.61
Part Details
- High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical Sterilization
- Resistant Up to 75kGy (kiloGray) of Radiation
- One Time Programmable (OTP) 10kb of User Data, Keys, and Certificates
- ECC-P256 Compute Engine
- FIPS 186 ECDSA P256 Signature and Verification
- ECDH Key Exchange for Session Key Establishment
- ECDSA Authenticated R/W of Configurable Memory
- SHA-256 Compute Engine
- FIPS 180 MAC for Secure Download/Boot
- FIPS 198 HMAC for Bidirectional Authentication and Optional GPIO Control
- SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
- One GPIO Pin with Optional Authentication Control
- Open-Drain, 4mA/0.4V
- Optional SHA-256 or ECDSA Authenticated On/Off and State Read
- Optional ECDSA Certificate to Set On/Off After Multiblock Hash for Secure Download
- TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
- Optional Chip Generated Pr/Pu Key Pairs for ECC Operations or Secrets for SHA256 Functions
- Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
- Optional Input Data Component to Crypto and Key Operations
- Advanced 1-Wire Protocol Minimizes Interface to Just Single Contact
- Operating Range: 3.3V ±10%, 0°C to +50°C
- ±8kV HBM ESD Protection of 1-Wire IO Pin
- 6-Pin TDFN and 2-Pin SFN
The DS28E83 is a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS-compatible true random number generator (TRNG), 10Kb of secured OTP, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).
The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.
The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation, including an ECDSA-based crypto-robust mode to support secure boot of a host processor.
DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.
APPLICATIONS
- Medical Consumables Secure Authentication
- Medical Tools/Accessories Identification and Calibration
- Accessory and Peripheral Secure Authentication
- Secure Storage of Cryptographic Keys for Host Controllers
- Secure Boot or Download of Firmware and/or System Parameters
Documentation
Data Sheet 1
Design Note 1
Technical Articles 12
Video 2
ADI has always placed the highest emphasis on delivering products that meet the maximum levels of quality and reliability. We achieve this by incorporating quality and reliability checks in every scope of product and process design, and in the manufacturing process as well. "Zero defects" for shipped products is always our goal. View our quality and reliability program and certifications for more information.
Part Model | Pin/Package Drawing | Documentation | CAD Symbols, Footprints, and 3D Models |
---|---|---|---|
DS28E83G+T | 2-SFN-3.5X6.5X0.75? | ||
DS28E83Q+T | Thin Dual Flatpack No Leads, Exposed Pad | ||
DS28E83Q+U | Thin Dual Flatpack No Leads, Exposed Pad |
This is the most up-to-date revision of the Data Sheet.
Hardware Ecosystem
Parts | Product Life Cycle | Description |
---|---|---|
Secure Authenticators 1 | ||
DS2476 | PRODUCTION | DeepCover Secure Coprocessor |
Tools & Simulations
Software Development 1
DeepCover® Security Lab
Open Tool
Evaluation Kits
Latest Discussions
No discussions on ds28e83 yet. Have something to say?
Start a Discussion on EngineerZone®