DS28C40ATB/VY+

Analog Devices / Maxim Integrated
700-DS28C40ATB/VY+
DS28C40ATB/VY+

Mfr.:

Description:
Security ICs / Authentication ICs Deep Cover Automotive I C Authenticator

ECAD Model:
Download the free Library Loader to convert this file for your ECAD Tool. Learn more about the ECAD Model.

In Stock: 305

Stock:
305 Can Dispatch Immediately
Factory Lead Time:
11 Weeks Estimated factory production time for quantities greater than shown.
Minimum: 1   Multiples: 1
Unit Price:
$-.--
Ext. Price:
$-.--
Est. Tariff:

Pricing (USD)

Qty. Unit Price
Ext. Price
$4.07 $4.07
$3.09 $30.90
$2.84 $71.00
$2.57 $257.00
$2.44 $610.00
$2.34 $1,170.00
$2.27 $2,270.00
$2.20 $5,491.20

Product Attribute Attribute Value Select Attribute
Analog Devices Inc.
Product Category: Security ICs / Authentication ICs
RoHS:  
TDFN-10
Tray
Brand: Analog Devices / Maxim Integrated
Country of Assembly: Not Available
Country of Diffusion: Not Available
Country of Origin: TH
Product Type: Security ICs / Authentication ICs
Factory Pack Quantity: 624
Subcategory: Security ICs / Authentication ICs
Products found:
To show similar products, select at least one checkbox
Select at least one checkbox above to show similar products in this category.
Attributes selected: 0

This functionality requires JavaScript to be enabled.

CAHTS:
8542320090
USHTS:
8542320071
MXHTS:
8542320299
ECCN:
EAR99

DS28C40 DeepCover Automotive I2C Authenticators

Analog Devices DS28C40 DeepCover Automotive I2C Authenticators provide a core set of cryptographic tools derived from integrated asymmetric (ECC-P256) and symmetric (SHA-256) security functions. The devices integrate a FIPS/NIST true random number generator (TRNG), 6kb of one-time programmable (OTP) memory for user data, keys and certificates, one configurable GPIO, and a unique 64-bit ROM identification number (ROM ID). The ECC public/private key capabilities operate from the NIST-defined P-256 curve, including FIPS 186-4 compliant ECDSA signature generation and verification to support a bidirectional asymmetric key authentication model. The SHA-256 secret-key capabilities comply with FIPS 180 and allow flexibility when used in conjunction with ECDSA operations or independently for multiple HMAC functions.