The world is becoming more connected every day. Security has become a requirement for many applications, including internet of things (IoT) devices. At the same time, malicious hackers are becoming more sophisticated than ever as they build advanced attack scenarios to infiltrate IoT devices. Trusted platforms, IP protection, secure download, and secure communication are the most frequent requirements for IoT node security.

DeepCover® embedded security solutions allow you to easily protect your entire system. Secure device authentication, secure boot, and robust cryptography ensure your platforms are trustworthy. DeepCover embedded security ICs with ChipDNA PUF technology deliver strong protection against invasive physical attacks. Beyond silicon, we provide reference schematics, drivers, middleware, communication stacks, and support to enable fast time to market. Our system approach guarantees a higher security level, including secure factory programming and key management.

DeepCover Secure Microcontrollers

DeepCover Secure Microcontrollers integrate advanced cryptography and hardware-based security to offer the highest level of protection against physical tampering and reverse engineering.

Our proprietary active tamper reaction technology instantaneously wipes out the keys and secrets of devices during attempted tampering, enabling a security level of FIPS 140-2 level 3 or 4. For applications that cannot accommodate a battery, DeepCover secure micros based on tamper-proof EEPROM are available.
DeepCover Secure Microcontrollers 

DeepCover Secure Authenticators

DeepCover Secure Authenticators implement advanced physical security to provide the ultimate in low-cost IP protection, clone prevention, and peripheral authentication. The core set of fixed-function crypto operations and secure key storage are supplemented with options including secure download/boot processing, protected nonvolatile memory for end application use, secure GPIO, decrement-only counters, session key generation, true random number source, and encrypted read/write of stored data. Devices with the 1-Wire® interface are ideal for connecting to nontraditional form factors such as printer cartridges, medical disposables, and battery packs.

Secure Authenticators with ChipDNA PUF Technology
ChipDNA technology—based on a physically unclonable function (PUF)—provides an exponential increase in protection against invasive and reverse engineering attacks. In our ChipDNA authenticators, the PUF circuit relies on the naturally occurring random analog characteristics of fundamental MOSFET devices to produce cryptographic keys, making it immune to all known invasive attack tools and capabilities. In addition to the protection benefits, ChipDNA simplifies or eliminates the need for secure IC key management.

Learn More:

Maxim Security Lab: Explore security topics and test drive secure authenticators ›

ChipDNA Embedded Security PUF Technology ›

DeepCover ChipDNA Secure Authenticators 

DeepCover Secure Authenticators 

DeepCover Security Managers

DeepCover Security Managers combine advanced hardware-based security with on-chip, non-imprinting memory to safeguard sensitive data, including secrets and private keys, from the slightest physical or environmental tampering.

DeepCover Security Managers 

Featured Videos

Automotive DeepCover Secure Authenticators Stop Counterfeit Parts
0:30 December 04, 2019

Security Excellence Lab: DPA Attack Demo
2:09 April 18, 2019

Introduction to the DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection
6:46 January 22, 2019

Technical Documentation


Technical Documentation

Technical Documents

Showing 10 of View Top 100 Results View All Results

Part Number Title Document Type Date

Latest Blogs

Why Hardware-Based Cryptography Offers Stronger IoT Design Protection

August 18, 2020

Learn why a hardware-based approach to cryptography provides more robust protection of IoT designs than software cryptography.

Here’s an Easier Way to Keep Your IoT Devices Safe from Hackers

August 06, 2020

Learn how a new cryptographic coprocessor makes it easy to implement end-to-end encryption and other cybersecurity features for IoT devices.

How Cryptographic Algorithms Protect Embedded Designs

June 16, 2020

Understand how cryptography algorithms, including symmetric keys and asymmetric keys, work their magic to protect designs from security threats.

The Keys to How Modern Cryptography Keeps Transactions Safe

June 09, 2020

Get a better understanding of how modern cryptography works, with special emphasis on asymmetric and symmetric keys.

What’s All the Fuss About Cryptography?

May 07, 2020

Get up to speed on the basics of cryptography, so you can protect your IoT designs from hackers and other security threats.

How to Stop an Invasive Attack on Your Design

January 18, 2018

Maxim’s Scott Jones explains to an ESC audience how PUF technology integrated into secure authenticators protects against invasive attacks.

PUF Technology Protects Against Invasive Attacks

January 11, 2018

Secure authenticators with physically unclonable function (PUF) technology offer the most robust protection against invasive attacks.

You Can’t Steal a Key that Isn’t There

November 21, 2017

Learn how Maxim's ChipDNA™ technology, based on a physically unclonable function (PUF), protects IoT designs against invasive attacks.

See more
Product Image


Power-optimized Arm Cortex-M4F. Optimal peripheral mix provides platform scalability. On-board B...
Product Image


Platform to evaluate the MAX32650 ultra-low-power memory-scalable microcontroller designed speci...
Product Image


Power-optimized Arm® Cortex®-M4F. On-board PMIC provides all necessary voltages. Ultra-compact 0...
Product Image


Protects IP and authenticates peripherals to Xilinx Zynq™ FPGAs.
Product Image


Power-optimized Arm® Cortex®-M4F. Optimal Peripheral Mix Provides Platform Scalability. On-Board...
Product Image


Demonstrates an authenticated data chain from a protected sensor node to a web server.
Product Image

MAXREFDES34 (Alcatraz)

This design implements SHA-256 authentication function using the 1-Wire protocol.
Product Image


Platforms to evaluate the MAX32665/MAX32666 high-efficiency Arm® microcontroller and audio DSP f...
Product Image


Compact development platform that provides access to all the features of the MAX32660 in a tiny,...
See more