MAX36010
PRODUCTIONSecurity Supervisor with Tamper Detection and Cryptography
Small Footprint Secure Memory with Advanced Security Protection
- Part Models
- 2
- 1ku List Price
- price unavailable
Part Details
- Low-Power Security Supervisor Enables Cost-Effective Security Solution
- 1024B Battery-Backed NV SRAM with High-Speed Erase
- Battery-Backed Tamper Circuit and RTC
- Low-Current Battery-Backup Operation
- Operates from Single 3.3V Supply
- Security Features Facilitate System-Level Protection
- Tamper Detection with Fast Wipe Key/Data Detection
- Secret Key Destruction on Tamper Events
- Hardware Accelerators for AES, RSA, ECDSA, DES, 3DES, SHA-1, SHA-224, and SHA-256
- True Hardware Random-Number Generator
- Temperature and Voltage Sensors to Detect Attacks
- 2 Pairs of External Sensor Tamper Detects
- Time Stamp for Tamper Event
- Encrypted NV SRAM Data Transfer
- Unique 128-Bit Serial Number
- Integrated Peripherals Allow for Easy Integration into Applications
- Programmable Alarm with External Output
- CPU Supervisor
- SPI/I²C/UART Interface
- Up to 4 General-Purpose I/O Pins
As Internet connectivity and greater intelligence get integrated into more products, these products can also boast more potential points of vulnerability if left unprotected. Embedded security technologies, such as security supervisors, can safeguard these designs from hacking, counterfeiting, and other security breaches faced by Internet of things (IoT) designs. The MAX36010/MAX36011 are low-power security supervisors designed for fiscal memory, internet security, and IP protection applications that require certificate-based or other public key cryptography schemes. The devices also incorporate sophisticated security mechanisms to protect sensitive information in secure memory, two pairs of external sensor input, and environmental monitors (temperature and voltage sensors) that erase the secure memory when an attack condition is detected.
One SPI, one I²C, and one UART interfaces are provided for secure, flexible communication to external system nodes. Device control and configuration are performed through a SPI, I²C, or UART interface.
The MAX36010/MAX36011 include on-chip 1KB secure memory that is always protected by dynamic sensors and environmental sensors. When there is a tamper event, the 1KB secure memory is erased in less than 1μs after the DRS has been completed. Tamper source and time of tamper is recorded in battery-backed registers. The MAX36010/MAX36011 enter a reset state until the tamper source is removed.
A real-time clock (RTC) is used to keep the current date and time. It is also useful when a tamper event happens, the tamper time is recorded and stored in a battery-backed register. The RTC has an alarm function. An alarm can be set 12 days in advance. The application can use the alarm to trigger the host processor on a daily basis for regular status monitoring and time adjusting between the host and MAX36010/MAX36011. When an alarm event happens, an output pulse is sent to the ALM pin. The RTC comes with a trim function. Certain number of clocks could be added or subtracted from RTC counter so as to compensate the time drift caused by temperature change on external crystal.
The MAX36010/MAX36011 support high-speed encryption with hardware accelerators for AES, RSA, ECDSA, SHA-1, SHA-224, SHA-256, DES, and 3DES. The hardware accelerator has an individual clock that is generated from a 65MHz internal ring oscillator. The MAX36010/MAX36011 act as coprocessors to encrypt data for the host processor. A true hardware random number generator is included for key generation and challenge generation. The MAX36010/MAX36011 provide side-channel attack countermeasures along with cryptography function. The MAX36010 supports symmetric key generation for AES and DES/3DES; whereas the MAX36011 supports both symmetric and asymmetric key generation for AES, DES/3DES, RSA, and ECDSA.
Sensitive information can be stored in the 1KB NV SRAM. Sensitive data transfer is in cipher text mode. Data in NVSRAM is encrypted by an AES-128 key before data is sent over SPI, I²C, or UART. The host processor must decrypt the data with the corresponding AES-128 key to retrieve useful information.
The device is powered by a 3.3V supply. A battery connection is provided for applications that want to maintain secure memory data for years without draining the main power supply. In battery-backed mode, the secure memory and security sensors consume less than 750nA (typ).
Applications
- Electronic Signature Generation
- Gaming Machines
- Internet Security
- IP Protection
- Points of Sales
- Secure Access Control
- Security and Banking Tokens
- Smart Control Systems for Home Automation
- Smart Factory for Industrial 4.0
- Smart Grid Security
Documentation
Request an NDA
Complete documentation is available upon completion of a Non-Disclosure Agreement (NDA).
Request an NDAVideo 1
ADI has always placed the highest emphasis on delivering products that meet the maximum levels of quality and reliability. We achieve this by incorporating quality and reliability checks in every scope of product and process design, and in the manufacturing process as well. "Zero defects" for shipped products is always our goal. View our quality and reliability program and certifications for more information.
Part Model | Pin/Package Drawing | Documentation | CAD Symbols, Footprints, and 3D Models |
---|---|---|---|
MAX36010-BNS+ | Thin Quad Flatpack, No Leads | ||
MAX36010-BNS+T | Thin Quad Flatpack, No Leads |
Evaluation Kits
Latest Discussions
No discussions on max36010 yet. Have something to say?
Start a Discussion on EngineerZone®