By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Maxim’s Authenticator for Genuine Parts Boosts Vehicle Safety & Security

Maxim Integrated has enhanced the safety, security and data integrity for vehicle systems by launching the DS28E40 DeepCover automotive secure authenticator. The authenticator reduces both complexity and code development by authenticating genuine components.

Maxim“The parasitically powered 1-Wire authenticator opens up automotive endpoints that can be secured and properly authenticated by adding just one chip,” said Michael Haight, director, Embedded Security at Maxim Integrated. “With the ground plus single contact for power and communication, even a passive automotive component that doesn’t otherwise have electronics could be connected to an engine control unit (ECU) and authenticated.”

As the newest addition to Maxim Integrated’s line of AEC-Q100 Grade 1 solutions for automotive systems, the DS28E40 is a parasitically-powered authenticator utilizing a 1-Wire interface for simple connectivity. This authenticator IC ensures that only genuine components are used for many electronic systems, such as advanced driver assistance systems (ADAS) and electric vehicle batteries.

The DS28E40 DeepCover authenticator is a fixed-function, 1-Wire solution that meets the AEC-Q100 standard Grade 1 performance standards and replaces microcontroller-based approaches. The fixed-function device gives OEMs a targeted algorithm and command toolset to meet their specific security needs while reducing both system design complexity and associated code development efforts.

The 1-Wire interface combines power and communication on a single pin and thus requires only two interconnects including the ground pin. Fewer interconnect pins reduce cost and further improves reliability by enabling smaller cable harnesses to connect an ECU to a remote endpoint. The DS28E40 comes in a compact, 4mm-x-3mm TDFN package and operates over the -40-degree to +125-degree Celsius temperature range. 

Key Advantages

  • Robust Security: Built-in symmetric key secure hash algorithm (SHA-256) support; secure storage of ECDSA and SHA-256 keys; one-time-programmable nonvolatile memory for storage of digital certificates and manufacturing data; hardware-based security stronger than software approach
  • Higher Reliability: Dedicated function reduces code size; 1-Wire interface reduces interface pins from 6 to 2
  • Simple to Integrate: Authentication algorithms built into the IC eliminate device-level development code efforts; 1-wire interface and low software overhead on host side simplify design integration and do not require external power

Tags

Aishwarya Saxena

A book geek, with creative mind, an electronics degree, and zealous for writing.Creativity is the one thing in her opinion which drove her to enter into editing field. Allured towards south Indian cuisine and culture, love to discover new cultures and their customs. Relishes in discovering new music genres.

Related Articles