DeepCover Secure Authenticators
Security Lab
Challenge & Response Authentication using symmetric SHA-256
Works with MAXAUTHDEMO1 with DS28C36
Challenge & Response Authentication using asymmetric ECDSA
Works with MAXAUTHDEMO1 with DS28C36
Authenticated Sha-256 write
Works with MAXAUTHDEMO1 with DS28C36
Authenticated ECDSA write
Works with MAXAUTHDEMO1 with DS28C36
ECDH key establishment & Encrypted IO
Works with MAXAUTHDEMO1 with DS28C36
Secure Download
Works with MAXAUTHDEMO1 with DS28C36
Secure GPIO
Works with MAXAUTHDEMO1 with DS28C36
True Random Generator
Works with MAXAUTHDEMO1 with DS28C36
Secure Counting
Works with MAXAUTHDEMO1 with DS28C36
Challenge & Response Authentication using asymmetric ECDSA
Works with MAXAUTHDEMO2 with DS28E38
True Random Generator
Works with MAXAUTHDEMO2 with DS28E38
Secure Counting
Works with MAXAUTHDEMO2 with DS28E38
DeepCover Security Lab

Running the Lab

    1. Order the MAXAUTHDEMO1# or MAXAUTHDEMO2#
    2. Plug in the MAXAUTHDEMO
    3. Download the Security Lab application
    4. Run the Security Lab application
    5. A command window will open with a prompt to 'Enter link code'. Type the code below at the prompt
      119549

    6. Press the Start Connection button to establish connection between the website and the Security Lab application
      Start Hardware Interface
      Hardware Connection Not Ready


    7. Select the desired hardware
    8. Select Hardware


    9. Select the desired lab from the left

Challenge & Response Authentication Using Symmetric SHA-256

Host Computed Slave Secret

Select Page

Authentication Result

Challenge & Response Authentication Using Asymmetric ECDSA

Verify Slave is Part of System
Modify Hash Input

Authentication Result

Press Next to Start USB Adapter Connection

Authenticated SHA-256 Write

Host Computed Slave Secret

Slave Page 0

New Page Data

Authenticate New Page Data
Attacks

Press Next to Start USB Adapter Connection

Authenticated ECDSA Write

Slave Authenticate Host Public Key

Slave Page 1

Authenticate New Page Data

Authentication Result

Press Next to Start USB Adapter Connection

ECDH Key Establishment and Encrypted IO

Verify Slave is Part of System

Compute Slave Session Key

Compute Host Session Key

Encrypted Page Data (Using Page 2)

Press Next to Start USB Adapter Connection

Secure Download

Verify Slave is Part of System

Sign Download Data

Press Next to Start USB Adapter Connection

Secure Encrypted GPIO

Host Computed Slave Secret

GPIO Page

Press Next to Start USB Adapter Connection

True Random Generator

Select Number of RNG Bytes

Press Next to Start USB Adapter Connection

Secure Counting

Secure Counting

Press Next to Start USB Adapter Connection

Challenge & Response Authentication Using Asymmetric ECDSA

Verify Slave is Part of System
Simulate Incorrect Certificate

Authentication Result

Press next to load device info

True Random Generator

Select Number of RNG Bytes

Press Next to Start USB Adapter Connection

Secure Counting

Secure Counting

Press Next to Start USB Adapter Connection