The DS28C40 DeepCover automotive secure authenticator is offered as enabling designers to enhance safety, security, and data integrity for connected vehicle systems while also reducing both complexity and code development time. The device, says the company, reduces the design complexity and software vulnerability of current approaches to ensure only genuine components are used for many electronic systems, such as advanced driver assistance systems (ADAS) and electric vehicle (EV) batteries.
"Automotive OEMS and Tier-1s are faced with time and resource constraints when it comes to implementing security for advanced electronic systems," says Michael Haight, director, Embedded Security at Maxim Integrated. "Our latest small-footprint authenticator ICs help them add the most advanced crypto-security available without adding new development teams to write and debug the code that is typically required for microcontroller and software-dependent approaches."
The DS28C40 helps address issues related to growing safety and security risks as cars become increasingly technologically sophisticated. Automotive manufacturers use authentication to ensure only OEM-certified components are safely connected to vehicle systems, as well as reduce the growing threat of malware attacks.
However, says the company, full-blown secure microcontrollers usually have a relatively big footprint and require software development teams to create, rigorously test and debug their code. The bigger the code base is, the higher the risk of bugs or malware adversely affecting performance.
As the only authenticator that meets the AEC-Q100 standard with Grade 1 performance, says the company, the DS28C40 DeepCover authenticator replaces microcontroller-based approaches, reducing both system design complexity and associated code development efforts, and deters theft of high-value components such as front-light modules. It also offers public/private key asymmetric ECDSA (ECC-P256 curve) and other key authentication algorithms built into the IC, allowing OEMs to skip development of proprietary device-level code.
This and other algorithms in the authenticator IC, says the company, provide the strongest defense against unauthorized components that could compromise performance, safety, and data integrity. The DS28C40 comes in a compact,