
DS28E84Q+U
UnknownDEEPCOVER RADIATION RESISTANT, HIGH-CAPACITY 1-WIRE SECURE AUTHENTICATOR
Deep-Dive with AI
Search across all available documentation for this part.

DS28E84Q+U
UnknownDEEPCOVER RADIATION RESISTANT, HIGH-CAPACITY 1-WIRE SECURE AUTHENTICATOR
Technical Specifications
Parameters and characteristics for this part
| Specification | DS28E84Q+U |
|---|---|
| Applications | Authentication, Security |
| Mounting Type | Surface Mount |
| Supplier Device Package | 6-TDFN (3x3) |
| Type | Authentication Chip |
Pricing
Prices provided here are for design reference only. For realtime values and availability, please visit the distributors directly
| Distributor | Package | Quantity | $ | Updated |
|---|---|---|---|---|
Description
General part information
DS28E84 Series
The DS28E84 is a radiation-resistant secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS-compatible true random number generator (TRNG), 10Kb of secured OTP, 15Kb of FRAM, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186-compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.The GPIO pin can be operated under command control and include configurability supporting authenticated and nonauthenticated operation, including an ECDSA-based crypto-robust mode to support secure boot of a host processor.DeepCover®embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.ApplicationsAccessory and Peripheral Secure AuthenticationMedical Consumables Secure AuthenticationMedical Tools/Accessories Identification and CalibrationSecure Boot or Download of Firmware and/or System ParametersSecure Storage of Cryptographic Keys for Host Controllers
Documents
Technical documentation and resources