Zenode.ai Logo
Mill-Max-316-93-133-61-001000 Connector Headers and PCB Receptacles Conn Socket Strip SKT 33 POS 2.54mm Solder ST Thru-Hole
Integrated Circuits (ICs)

DS28C36BQ+T

Active
Analog Devices Inc./Maxim Integrated

SECURITY ICS / AUTHENTICATION ICS DEEPCOVER SECURE AUTHENTICATOR

Deep-Dive with AI

Search across all available documentation for this part.

Mill-Max-316-93-133-61-001000 Connector Headers and PCB Receptacles Conn Socket Strip SKT 33 POS 2.54mm Solder ST Thru-Hole
Integrated Circuits (ICs)

DS28C36BQ+T

Active
Analog Devices Inc./Maxim Integrated

SECURITY ICS / AUTHENTICATION ICS DEEPCOVER SECURE AUTHENTICATOR

Technical Specifications

Parameters and characteristics for this part

SpecificationDS28C36BQ+T
Mounting TypeSurface Mount
Supplier Device Package6-TDFN (3x3)
TypeSecure Authenticator

Pricing

Prices provided here are for design reference only. For realtime values and availability, please visit the distributors directly

DistributorPackageQuantity$Updated
ArrowN/A 2500$ 1.691m+
DigikeyCut Tape (CT) 1$ 4.05<3d
10$ 3.06
25$ 2.82
100$ 2.55
250$ 2.42
500$ 2.34
1000$ 2.27
Tape & Reel (TR) 2500$ 2.21<3d
MouserN/A 1$ 3.031m+
10$ 2.69
25$ 2.48
100$ 2.39
250$ 2.28
500$ 2.20
1000$ 2.16
2500$ 2.14
5000$ 1.83

Description

General part information

DS28C36 Series

The DS28C36 is a DeepCover®secure authenticator that provides a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. In addition to the security services provided by the hardware implemented crypto engines, the device integrates a FIPS/NIST true random number generator (RNG), 8Kb of secured EEPROM, a decrement-only counter, two pins of configurable GPIO, and a unique 64-bit ROM identification number (ROM ID).The ECC public/private key capabilities operate from the NIST defined P-256 curve and include FIPS 186 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities are compliant with FIPS 180 and are flexibly used either in conjunction with ECDSA operations or independently for multiple HMAC functions.Two GPIO pins can be independently operated under command control and include configurability supporting authenticated and nonauthenticated operation including an ECDSA-based crypto-robust mode to support secure-boot of a host processor.DeepCover embedded security solutions cloak sensitive data under multiple layers of advanced security to provide the most secure key storage possible. To protect against device-level security attacks, invasive and noninvasive countermeasures are implemented including active die shield, encrypted storage of keys, and algorithmic methods.ApplicationsIoT Node Crypto-ProtectionAccessory and Peripheral Secure AuthenticationSecure Storage of Cryptographic Keys for a Host ControllerSecure Boot or Download of Firmware and/or System Parameters