
DS28E25G+T
ActiveDEEPCOVER SECURE AUTHENTICATOR WITH 1-WIRE SHA-256 AND 4KB USER EEPROM
Deep-Dive with AI
Search across all available documentation for this part.

DS28E25G+T
ActiveDEEPCOVER SECURE AUTHENTICATOR WITH 1-WIRE SHA-256 AND 4KB USER EEPROM
Technical Specifications
Parameters and characteristics for this part
| Specification | DS28E25G+T |
|---|---|
| Applications | Authentication, Security |
| Mounting Type | Surface Mount |
| Package / Case | 2-SFN |
| Supplier Device Package | 2-SFN (6x6) |
| Type | Authentication Chip |
Pricing
Prices provided here are for design reference only. For realtime values and availability, please visit the distributors directly
| Distributor | Package | Quantity | $ | Updated |
|---|---|---|---|---|
| Digikey | Cut Tape (CT) | 1 | $ 4.71 | <3d |
| 10 | $ 4.39 | |||
| 25 | $ 4.26 | |||
| 50 | $ 4.16 | |||
| 100 | $ 4.06 | |||
| 250 | $ 3.93 | |||
| 500 | $ 3.84 | |||
| 1000 | $ 3.74 | |||
| Tape & Reel (TR) | 2500 | $ 2.89 | <3d | |
Description
General part information
DS28E25 Series
DeepCover™ embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.The DeepCover Secure Authenticator (DS28E25) combines crypto-strong, bidirectional, secure challengeand- response authentication functionality with an implementation based on the FIPS 180-3-specified Secure Hash Algorithm (SHA-256). A 4Kb user-programmable EEPROM array provides nonvolatile storage of application data and additional protected memory holds a readprotected secret for SHA-256 operations and settings for user memory control. Each device has its own guaranteed unique 64-bit ROM identification number (ROM ID) that is factory programmed into the chip. This unique ROM ID is used as a fundamental input parameter for cryptographic operations and also serves as an electronic serial number within the application. A bidirectional security model enables two-way authentication between a host system and slave-embedded DS28E25. Slave-to-host authentication is used by a host system to securely validate that an attached or embedded DS28E25 is authentic. Hostto-slave authentication is used to protect DS28E25 user memory from being modified by a nonauthentic host. The SHA-256 message authentication code (MAC), which the DS28E25 generates, is computed from data in the user memory, an on-chip secret, a host random challenge, and the 64-bit ROM ID. The DS28E25 communicates over the single-contact 1-Wire®bus at overdrive speed. The communication follows the 1-Wire protocol with the ROM ID acting as node address in the case of a multiple-device 1-Wire network.OurSecure Drug Delivery videoshows how Maxim security products can be used to authenticate remote drug delivery.ApplicationsAuthentication of Network-Attached AppliancesKey Generation and Exchange for Cryptographic SystemsPrinter Cartridge ID/AuthenticationReference Design License ManagementSecure Feature Setting for Configurable SystemsSensor/Accessory Authentication and CalibrationSystem Intellectual Property Protection
Documents
Technical documentation and resources