应用案例
Maxim公司的DS28E83是耐辐射安全认证器,从集成的非对称(ECC-P256)和对称(SHA-256安全函数推算核心密码工具,除了由硬件实现加密引擎的安全服务外,器件集成了FIPS兼容的真随机号码发生器(TRNG),10Kb安全OTP,一个可配置GPIO和一个唯一64位ROM身份码(ROM ID),医用灭菌抗性抗辐射高达75kGy (kiloGray),同时可使用户可编程制造或校准数据.1-Wire IO引脚±8kV HBM ESD保护,工作电压3.3V ±10%, 工作温度0℃ 到 +50℃ ,主要用在医疗安全认证,医疗工具/附件身份和校准,附件和外设安全认证,主控制器的密钥安全存储,固件和/或系统参数的安全引导或下载.本文介绍了DS28E83主要优势和特性,简化框图,典型应用电路图以及评估板DS28E83 EVK主要特性和电路图与材料清单.
The DS28E83 is a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS-compatible true random number generator (TRNG), 10Kb of secured OTP, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).
The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.
The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation, including an ECDSA-based crypto-robust mode to support secure boot of a host processor.
DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.
DS28E83主要优势和特性:
High Radiation Resistance Allows User-Programmable Manufacturing or Calibration Data Before Medical SterilizationResistant Up to 75kGy (kiloGray) of Radiation
One Time Programmable (OTP) 10kb of User Data, Keys, and Certificates
ECC-P256 Compute EngineFIPS 186 ECDSA P256 Signature and Verification
ECDH Key Exchange for Session Key Establishment
ECDSA Authenticated R/W of Configurable Memory
SHA-256 Compute EngineFIPS 180 MAC for Secure Download/Boot
FIPS 198 HMAC for Bidirectional Authentication and Optional GPIO Control
SHA-256 OTP (One-Time Pad) Encrypted R/W of Configurable Memory Through ECDH Established Key
One GPIO Pin with Optional Authentication ControlOpen-Drain, 4mA/0.4V
Optional SHA-256 or ECDSA Authenticated On/Off and State Read
Optional ECDSA Certificate to Set On/Off After Multiblock Hash for Secure Download
TRNG with NIST SP 800-90B Compliant Entropy Source with Function to Read Out
Optional Chip Generated Pr/Pu Key Pairs for ECC Operations or Secrets for SHA256 Functions
Unique and Unalterable Factory Programmed 64-Bit Identification Number (ROM ID)
Optional Input Data Component to Crypto and Key Operations
Advanced 1-Wire Protocol Minimizes Interface to Just Single Contact
Operating Range: 3.3V ±10%, 0℃ to +50℃
±8kV HBM ESD Protection of 1-Wire IO Pin
6-Pin, 3mm x 3mm TDFN
DS28E83应用:
Medical Consumables Secure Authentication
Medical Tools/Accessories Identification and Calibration
Accessory and Peripheral Secure Authentication
Secure Storage of Cryptographic Keys for Host Controllers
Secure Boot or Download of Firmware and/or System Parameters
全部0条评论
快来发表一下你的评论吧 !