Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Product List
SHA-256 Authenticators for IP Protection Slide 7
An existing microcontroller or FPGA IC solution does not require a coprocessor. The solution can consist simply of a host and an authenticator. This solution also has three main benefits. #1) This solution uses an Authenticator IC with integrated advanced hardware security technologies to protect the device against invasive and non-invasive attacks. #2) It provides a low cost, easy-to-integrate solution. Because the 1-Wire interface only requires one I/O pin, existing designs can be easily retrofitted to provide authentication functionality. Portable C-libraries and Verilog code are available from Analog Devices to quickly integrate the SHA-256 cryptographic algorithm and the 1-Wire line driver into the existing controller solution. #3) The 1-Wire interface combines both data and power on a single pin and enables the authenticator IC to be parasitically powered. 1-Wire also allows up to six authenticators to be accessed on a single line. The block diagram illustrated here is a typical SHA-256 solution without a coprocessor. Implementing SHA-256 in a single chip solution requires the Microcontroller or FPGA to integrate the SHA-256 algorithm and 1-Wire line driving via software. This lower cost solution requires more expertise to ensure timing and electrical requirements are met by the system solution. The host communicates directly with the SHA-256 authenticator via the 1-Wire interface without needing the coprocessor.
PTM Published on: 2014-08-05