Detailed Description
The MAX66240 transponder combines an ISO 15693 RF
front-end, a SHA-256 engine, 4096 bits of user EEPROM
organized as 16 256-bit pages, protection control, status
memory, and a 64-bit ROM ID in a single chip. A 256-bit
scratchpad assists when installing a new secret or stores
the challenge when computing a page MAC.
It is common for a secure authentication IC to be attacked
using a variety of sophisticated die-level methods to
extract secure data, reverse device settings, etc., in an
effort to compromise a system security implementation.
To provide the highest affordable protection against this
inevitable malicious attack, the MAX66240 employs pro-
prietary die-level physical techniques, circuits, and crypto
methods to protect sensitive data, control signals, and
control settings.
There are multiple programmable options for the 4Kb user
array including unrestricted read/write and four protection
modes: read protection, write protection, EPROM emula-
tion mode, and authentication protection. Read protection
prevents user read-access to the memory, which effec-
tively extends the secret into the protected memory. The
data remains accessible only for the SHA-256 engine.
Write protection prevents changes to the memory data.
EPROM emulation mode logically ANDs memory data
with incoming new data, which allows changing bits from
1 to 0, but not vice versa. By changing one bit at a time,
this mode could be used to create a nonvolatile, nonreset-
table counter. EPROM emulation mode requires that the
memory is not write protected. Authentication protection,
if activated, requires that the host prove itself as authentic
(i.e., knows the MAX66240 secret) to modify the memory
by supplying a correct MAC that is based on the device
secret, its ROM ID, memory data, and the new data to
be copied to EEPROM. If the authentication hurdle is
passed, the write protection and EPROM emulation mode
protections still determine the effect of the write access.
Any protection, if activated, applies to individual memory
pages. As a factory default, none of the protections is
activated. Once authentication protection is activated, the
reader must authenticate itself for memory writes as well
as for additional changes to the memory protection.
In addition to its important use as a unique data value in
cryptographic SHA-256 computations, the device’s 64-bit
ROM ID can be used to electronically identify the object
to which the MAX66240 is associated. Applications of the
MAX66240 include, access control, asset tracking, printer
cartridge configuration and monitoring, medical sensor
authentication and calibration, and system intellectual
property protection.
Overview
The block diagram in Figure 1 shows the relationships
between the major control and memory sections of the
MAX66240.
Figure 2 shows the applicable commands and the
affected data fields. The network function commands
allow the reader to identify all transponders in its range
and to change their state, e.g., to select one for further
communication. The protocol required for these network
function commands is described in the Network Function
Commands section. The memory and control functions
fall into five categories: ISO 15693 generic commands,
secret installation, memory access, protection setting,
and MAC computation. The protocol for these com-
mands is described in the Memory and Control Function
Commands section. All data is read and written least
significant bit (LSb) first, starting with the least significant
byte (LSB).
MAX66240 DeepCover Secure Authenticator with
ISO 15693, SHA-256, and 4Kb User EEPROM
www.maximintegrated.com Maxim Integrated
│
5
ABRIDGED DATA SHEET