Embedded systems designers can now easily and cost-effectively integrate the industry’s most advanced crypto-strong authentication into their designs with the DS28E50 Deep Cover® secure hash algorithm 3 (SHA3-256) authenticator IC from Maxim Integrated Products, Inc. With SHA3-256, the DS28E50 delivers the latest technology for challenge-and-response authentication, providing the strongest defense against counterfeiting, unauthorized usage and other application problems in a secure IC solution suited for teams with limited or no cryptography expertise. Designers are seeking to protect product integrity against aftermarket counterfeits and strengthen guarantees that sensors inside these devices are genuine and not substandard clones. The DS28E50 provides embedded system developers with advanced ability to prevent counterfeiting, aftermarket cloning and unauthorized use of smart, connected industrial, medical and consumer devices. In addition to providing the industry’s first SHA3-256 authentication IC, the DS28E50 also integrates Maxim’s patented ChipDNA™ physically unclonable function (PUF) technology to prevent the IC-level attacks that are routinely attempted on security ICs.
Key Advantages of the DS28E50
• Cost-Effective, Crypto-Strong Security
• Ease of Implementation
• Tiny, Low-Power, Rugged Package
Maxim Integrated | www.maximintegrated.com