ABRIDGED DATA SHEET Request Full Data Sheet and Software Click here for production status of specific part numbers. MAXQ1061/MAXQ1062 DeepCover Cryptographic Controller for Embedded Devices General Description Benefits and Features DeepCover embedded security solutions cloak sensitive Advanced Cryptographic Tool Box Seamlessly data under multiple layers of advanced physical security Supports Highly Secure Key Storage to provide the most secure key storage possible. Certificates Chain Management The MAXQ1061/MAXQ1062 cryptographic controller Secure 32KB or 8KB File System Based on makes it fast and easy to implement full security for embed- Nonvolatile EEPROM (500K Cycles) for Extensive ded, connected products without requiring firmware devel- Key and Certificate Storage for MAXQ1061 and opment. The MAXQ1061/MAXQ1062 coprocessor can be MAXQ1061, Respectively designed-in from the start or added to an existing design to Symmetric-key: AES-128/-256 (ECB, CBC, CCM) guarantee confidentiality, authenticity, and integrity of the Asymmetric-key: ECC NIST P-256, -521, -384 and device. It is ideal for connected embedded devices, indus- Brainpool BP-256, -384, -512 trial networking, PLC, and network appliances. Secure Hash: SHA-256, -384, -512 The embedded, comprehensive cryptographic toolbox MAC Digest: CBC-MAC, HMAC-SHA256, HMAC- provides key generation and storage up to full SSL/ SHA384, HMAC-SHA512, ECIES TLS/DTLS support by offering a high level of abstraction Signature Schemes: ECDSA (FIPS 186-4) including TLS/DTLS key negotiation, ECDSA-based TLS/ Key Exchange: EC Diffie-Hellman (TLS) DTLS authentication, digital signature generation and 128-Bit AES Stream Encryption Engine Over SPI verification, SSL/TLS/DTLS packet encryption, and MAC algorithms. It can also serve as a secure bootloader for an (up to 20Mb/s) Supporting AES-GCM and AES- external generic microcontroller. ECB Modes On-Chip Key Generation: ECC, AES 32KB of user-programmable EEPROM of MAXQ1061 Random Number Generation: True RNG or 8KB of MAXQ1062 securely store certificates, public keys, private and secret keys, monotonic counters, and No Firmware Development Required Significantly arbitrary data. A flexible file system manages access Reduces Time to Market rights for the objects. The device is controlled over a SPI 2 High-Level Functions Simplify SSL/TLS/DTLS or I C interface. Life cycle management and a secure key Implementations loading protocols are provided. TLS/DTLS Key Negotiation (PSK, ECDH, ECDHE) Cryptographic algorithms supported by the device include ECDSA Based TLS/DTLS Authentication, Digital AES, ECC, ECDSA signature scheme, SHA, and MAC Signature Generation and Verification digest algorithms. The true random number generator can SSL/TLS/DTLS Packet Encryption (AES) be used for on-chip key generation. A separate hardware MAC Algorithm (HMAC-SHA256) AES engine over SPI allows the MAXQ1061/MAXQ1062 to function as a coprocessor for stream encryption. Extensive Host/System Services Increase Flexibility and Reduce System Cost The advanced physical, environmental and logical protec- Watchdog Timer tions, are designed to meet the stringent requirements of Power-On Reset/Brownout Reset FIPS and Common Criteria EAL4+ certifications. Secure Boot Function Applications Tamper Detection Internet of Things (IoT) Life Cycle Management and Key Loading Protocol Portable Medical Devices Flexible File System With User-Programmable Building and Home Automation Access Conditions for Each Object Software Reset Smart Metering Software Reset, Shutdown, and Wake-Up Functions Certificate Distribution and Management Multiple Communication Interface Options for Simpler Secure Access Control Connection to a Host Processor Electronic Signature Generation 2 I C Slave Controller Cybersecurity for Critical Infrastructures Gateways and Routers SPI Slave Controller with a Dedicated DMA Channel Programmable Logic Controllers and 128-Bit AES Stream Encryption Engine SCADA Supporting AES-GCM and AES-ECB Modes Smartgrid Monitoring Equipment Smart Meters Ordering Information appears at end of data sheet. 19-8718 Rev 5 12/19ABRIDGED DATA SHEET Request Full Data Sheet and Software MAXQ1061/MAXQ1062 DeepCover Cryptographic Controller for Embedded Devices administrator authentication only. TLS handshake Detailed Description cannot be performed with an unverified certificate. The DeepCover cryptographic controller (MAXQ1061/ MAXQ1062) is an effective and easy to implement solu- The exposure of private keys used for authenticating the equipment embedding the MAXQ1061/MAXQ1062. tion for strengthening security in embedded systems. Hardware resistance prevents the disclosure of such A comprehensive cryptographic toolbox supports an array of private keys. security needs. Simpler systems may require as little as the The exposure of the TLS sensitive data (shared provided key generation and storage. For high levels of securi- ty, full SSL/TLS/DTLS support offers a high level of abstraction. secret or session keys). These data remain inside the security module. Cryptographic algorithms supported by the device include AES-128/-256 with support for ECB, CBC, and CCM AES-SPI Engine modes, ECC (up to NIST P-521), ECDSA signature The 128-bit AES engine supports AES-GCM (SP 800-38D scheme, SHA-2 (up to SHA-512) secure hash algorithms, compliant) and AES-ECB (SP 800-A compliant) modes. A MAC digest algorithms such as CBC-MAC or HMAC-SHA. dedicated register enables key transfer from the TLS tool- It also has provision for on-chip key generation based box to the AES SPI engine. The block is tightly connected upon a random number generator. The device also pro- to the SPI slave controller through a dedicated DMA vides a separate hardware AES engine over SPI, sup- controller providing high-speed encryption/decryption of a porting AES-GCM and AES-ECB modes, and that can be data stream coming over the SPI interface. used to off-load a host processor for stream encryption. The SPI controller provides a dedicated command inter- preter that can only be used when in AES-SPI mode. The Communication Interface Selection command interpreter includes the following command set: 2 The devices communicate through the I C or SPI bus, Authentication only mode determined by the application (TLS toolbox or AES-SPI). Encryption only mode TLS/DTLS Cryptographic Toolbox Encryption with authentication mode AES operation mode selection The comprehensive cryptographic toolbox simplifies and Keys and initialization vector (IV) loading protocol increases the security and resistance of SSL/TLS/DTLS Secure storage and handling of block cipher key based applications It offers a high level of abstraction for (EK) and authentication key (AK) the following functions: Software reset Offloads the TLS key exchange Shutdown Securely stores certificates (makes them immutable) SSL/TLS/DTLS Functions Securely stores private keys TLS/DTLS key negotiation (ECDH, ECDHE) Helps securely verifying certificates and certificate ECDSA-based TLS/DTLS authentication, digital revocation lists signature generation and verification SSL/TLS/DTLS packet encryption (AES) Securely authenticates to the other peer MAC algorithm (HMAC-SHA256) Performs the key exchange securely SSL/TLS/DTLS host stack for most CPU architectures Can encrypt/decrypt and sign/verify data during TLS/DTLS Cipher Suites execution of the TLS record protocol using the keys RFC 5487 preshared key (TLS) negotiated during the TLS handshake o TLS PSK WITH AES 128 GCM SHA256 TLS key exchange and TLS record encryption/ o TLS PSK WITH AES 256 GCM SHA384 decryption are performed internally and never o TLS PSK WITH AES 128 CBC SHA exposed. The master secret can be exported to o TLS PSK WITH AES 128 CBC SHA256 perform the TLS record processing externally. o TLS PSK WITH AES 256 CBC SHA o TLS PSK WITH AES 256 CBC SHA384 The above security features prevent: The use of rogue certificates. Certificates are inter- nally verified and are managed using a dedicated Maxim Integrated 2 www.maximintegrated.com