DS28C40ATB/VY+

Analog Devices / Maxim Integrated
700-DS28C40ATB/VY+
DS28C40ATB/VY+

Mfr.:

Description:
Security ICs / Authentication ICs Deep Cover Automotive I C Authenticator

ECAD Model:
Download the free Library Loader to convert this file for your ECAD Tool. Learn more about the ECAD Model.

In Stock: 305

Stock:
305 Can Dispatch Immediately
Factory Lead Time:
11 Weeks Estimated factory production time for quantities greater than shown.
Minimum: 1   Multiples: 1
Unit Price:
-,-- €
Ext. Price:
-,-- €
Est. Tariff:

Pricing (EUR)

Qty. Unit Price
Ext. Price
3,50 € 3,50 €
2,66 € 26,60 €
2,44 € 61,00 €
2,21 € 221,00 €
2,10 € 525,00 €
2,01 € 1.005,00 €
1,95 € 1.950,00 €
1,89 € 4.717,44 €

Product Attribute Attribute Value Select Attribute
Analog Devices Inc.
Product Category: Security ICs / Authentication ICs
RoHS:  
TDFN-10
Tray
Brand: Analog Devices / Maxim Integrated
Country of Assembly: Not Available
Country of Diffusion: Not Available
Country of Origin: TH
Product Type: Security ICs / Authentication ICs
Factory Pack Quantity: 624
Subcategory: Security ICs / Authentication ICs
Products found:
To show similar products, select at least one checkbox
Select at least one checkbox above to show similar products in this category.
Attributes selected: 0

This functionality requires JavaScript to be enabled.

CAHTS:
8542320090
USHTS:
8542320071
MXHTS:
8542320299
ECCN:
EAR99

DS28C40 DeepCover Automotive I2C Authenticators

Analog Devices DS28C40 DeepCover Automotive I2C Authenticators provide a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. The devices integrate a FIPS/NIST true random number generator (TRNG), 6kb of one-time programmable (OTP) memory for user data, keys and certificates, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID). The ECC public/private key capabilities operate from the NIST-defined P-256 curve, including FIPS 186-4 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities comply with FIPS 180 and allow flexibility when used in conjunction with ECDSA operations or independently for multiple HMAC functions.