Click here to ask an associate for production status of specific part numbers.
DeepCover Radiation-Resistant 1-Wire
Authenticator
DS28E83
General Description
Benefits and Features
The DS28E83 is a radiation-resistant secure authenticator
that provides a core set of cryptographic tools derived
from integrated asymmetric (ECC P-256) and symmetric
(SHA-256) security functions. In addition to the security
services provided by the hardware implemented crypto
engines, the device integrates a FIPS-compatible true ran-
dom number generator (TRNG), 10Kb of secured OTP,
one configurable GPIO, and a unique 64-bit ROM identifi-
cation number (ROM ID).
High Radiation Resistance Allows User-Programmable
Manufacturing or Calibration Data Before Medical Steril-
ization
● Resistant up to 75kGy (kiloGray) of Radiation
● One-Time-Programmable (OTP) 10kb of User Data,
Keys, and Certificates
ECC P-256 Compute Engine
● FIPS 186 ECDSA P-256 Signature and Verification
● ECDH Key Exchange for Session Key Establishment
● ECDSA Authenticated R/W of Configurable Memory
The ECC public/private key capabilities operate from the
NIST-defined P-256 curve and include FIPS 186-compli-
ant ECDSA signature generation and verification to sup-
port a bidirectional asymmetric key authentication model.
The SHA-256 secret key capabilities are compliant with
FIPS 180 and are flexibly used either in conjunction with
ECDSA operations or independently for multiple HMAC
functions.
SHA-256 Compute Engine
● FIPS 180 MAC for Secure Download/Boot
● FIPS 198 HMAC for Bidirectional Authentication and
Optional GPIO Control
SHA-256 OTP (One-Time Pad) Encrypted R/W of Config-
urable Memory Through ECDH Established Key
The GPIO pin can be operated under command control
and include configurability supporting authenticated and
nonauthenticated operation, including an ECDSA-based
crypto-robust mode to support secure boot of a host
processor.
One GPIO Pin with Optional Authentication Control
● Open-Drain, 4mA/0.4V
● Optional SHA-256 or ECDSA Authenticated On/Off
and State Read
● Optional ECDSA Certificate to Set On/Off After
Multiblock Hash for Secure Download
®
DeepCover embedded security solutions cloak sensitive
data under multiple layers of advanced security to provide
the most secure key storage possible. To protect against
device-level security attacks, invasive and noninvasive
countermeasures are implemented including active die
shield, encrypted storage of keys, and algorithmic meth-
ods.
TRNG with NIST SP 800-90B Compliant Entropy Source
with Function to Read Out
Optional Chip-Generated Pr/Pu Key Pairs for ECC Opera-
tions or Secrets for SHA-256 Functions
Unique and Unalterable Factory-Programmed 64-Bit Iden-
tification Number (ROM ID)
Applications
● Medical Consumables Secure Authentication
● Medical Tools/Accessories Identification and
Calibration
● Accessory and Peripheral Secure Authentication
● Secure Storage of Cryptographic Keys for Host
Controllers
● Secure Boot or Download of Firmware and/or System
Parameters
● Optional Input Data Component to Crypto and Key
Operations
Advanced 1-Wire Protocol Minimizes Interface to Just Sin-
gle Contact
Operating Range: 3.3V ±10%, 0°C to +50°C
±8kV HBM ESD Protection of 1-Wire IO Pin
6-Pin TDFN and 2-Pin SFN
DeepCover® is a registered trademark of Maxim Integrated Products, Inc.
19-100287; Rev 1; 11/22
Ordering Information appears at end of data sheet.
© 2022 Analog Devices, Inc. All rights reserved. Trademarks and registered trademarks are the property of their respective owners.
One Analog Way, Wilmington, MA 01887 U.S.A. | Tel: 781.329.4700 | © 2022 Analog Devices, Inc. All rights reserved.