By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Maxim Provides Automotive-Grade Secure Authenticator to Enhance Vehicle Safety

Maxim Integrated Products has recently introduced DS28C40 DeepCover automotive secure authenticator.

MaximAs the industry’s first and only AEC-Q100 Grade 1 solution for automotive systems, this authenticator IC from Maxim reduces the design complexity and software vulnerability of current approaches to ensure only genuine components are used for many electronic systems, such as advanced driver assistance systems (ADAS) and electric vehicle (EV) batteries.

As cars become more sophisticated with the features they offer, safety and security risks grow as well. Automotive manufacturers use authentication to ensure only OEM-certified components are safely connected to vehicle systems, as well as reduce the growing threat of malware attacks. However,

full-blown secure microcontrollers usually have a relatively big footprint and require software development teams to create, rigorously test and debug their code. The bigger the code base is, the higher the risk of bugs or malware adversely affecting performance.

The DS28C40 DeepCover authenticator is the only authenticator that meets the AEC-Q100 standard with Grade 1 performance. It replaces microcontroller-based approaches and reduces both system design complexity and associated code development efforts.

The authenticator deters theft of high-value components such as front-light modules. It also offers public/private key asymmetric ECDSA (ECC-P256 curve) and other key authentication algorithms built into the IC, allowing OEMs to skip development of proprietary device-level code.

This and other algorithms in the authenticator IC provide the strongest defense against unauthorized components that could compromise performance, safety and data integrity. The DS28C40 comes in a compact, 4mm-x-3mm TDFN package and operates over the -40-degree to +125-degree Celsius temperature range.

Key Advantages

  • Robust Security: Built-in symmetric key secure hash algorithm (SHA-256) support; secure storage of ECDSA and SHA-256 keys; one-time programmable nonvolatile memory for storage of digital certificates and manufacturing data; hardware-based security stronger than software approach.
  • Simple Integration: Device-level development code efforts eliminated with authentication algorithms built into IC; industry-standard I2C interface and low software overhead on host side simplifies design integration.

For more info, click here:

Tags

Nitisha Dubey

I am a Journalist with a post graduate degree in Journalism & Mass Communication. I love reading non-fiction books, exploring different destinations and varieties of cuisines. Biographies and historical movies are few favourites.

Related Articles

Upcoming Events