• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Authenticator IC provides defense against counterfeiting, unauthorized usage and use of substandard sensor clones

October 17, 2018 By Aimee Kalnoskas Leave a Comment

SHA3-256Embedded systems designers can now easily and cost-effectively integrate the industry’s most advanced crypto-strong authentication into their designs with the DS28E50 DeepCover secure hash algorithm 3 (SHA3-256) authenticator IC from Maxim Integrated Products, Inc. The SHA3-256 provides the latest technology for challenge-and-response authentication, providing the strongest defense against counterfeiting, unauthorized usage and other application problems in a secure IC solution suited for teams with limited or no cryptography expertise.

Embedded systems continue to come under attack by increasingly sophisticated hackers. Designers are seeking to protect product integrity against aftermarket counterfeits and strengthen guarantees that sensors inside these devices are genuine and not substandard clones. The DS28E50 provides embedded system developers with advanced ability to prevent counterfeiting, aftermarket cloning and unauthorized use of smart, connected industrial, medical and consumer devices.

In addition to providing the industry’s first SHA3-256 authentication IC, the DS28E50 also integrates Maxim’s patented ChipDNA™ physically unclonable function (PUF) technology to prevent the IC-level attacks that are routinely attempted on security ICs. With ChipDNA technology, which is derived from the naturally occurring random analog characteristics of fundamental MOSFET devices, secret keys that protect all DS28E50 stored data are generated only when needed and are never stored on the chip.

The FIPS 202-compliant SHA3-256 implementation provides a cost-effective, less-complex way to implement highly advanced, secure challenge/response authentication to defend against counterfeiting and monitor or limit peripheral usage. ChipDNA PUF technology strongly protects all device-stored sensitive data from security attacks. A Single-contact, 1-Wire communication simplifies interface to end application. The IC includes secured EEPROM for end-application data with multiple configurable and irreversible memory-protection modes. No device-level firmware development is required (firmware is needed for the host-side microcontroller). In addition, a factory programming service is available for simplified secure key management.

The IC requires just 3.3V, operates from -40°C to +85°C, includes ±8kV human-body model (HBM) electrostatic discharge (ESD) protection, and is housed in a 6-pin, 3mm × 3mm TDFN package

The DS28E50 is available now at Maxim’s website for $0.97 (1000-up, FOB USA); also available with select authorized distributors. The DS28E50EVKIT# evaluation kit is available for $65

Filed Under: Applications, Embedded, Hardware, Security Tagged With: maximintegratedproducts

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy