首页|嵌入式系统|显示技术|模拟IC/电源|元件与制造|其他IC/制程|消费类电子|无线/通信|汽车电子|工业控制|医疗电子|测试测量
首页 > 分享下载 > 常用文档 > SHA iButton Secrets and Challenges

SHA iButton Secrets and Challenges

资料介绍
Abstract: Several applications use the Maxim SHA iButton® tokens for eCash, vending, fare collection, and user authentication. They require the use of secrets to recognize authentic tokens and to secure data and monetary values against tampering. The security of an entire cryptographic system rests with its ability to properly generate and protect its secrets and challenges. This application note describes methods to generate world-class cryptographic secrets and challenges. It also describes the devices that can hold those values where they are safe from attack, and describes schemes where secrets never leave the protected silicon environment at any time and are never subject to compromise.
Maxim > App Notes > 1-Wire Devices iButton Security and Authentication
Keywords: SHA iButton, SHA-1, secret, MAC, challenge, authentication, ecash, entropy, random numbers, cryptography, digital signature Mar 08, 2002

APPLICATION NOTE 152
SHA iButton Secrets and Challenges


Abstract:Several applications use the Maxim SHA iButton tokens for eCash, vending, fare collection, and user authentication.
They require the use of secrets to recognize authentic tokens and to secure data and monetary values against tampering. The
security of an entire cryptographic system rests with its ability to properly generate and protect its secrets and challenges. This
application note describes methods to generate world-class cryptographic secrets and challenges. It also describes the devices
that can
标签:MaximSHAiButtonSHA-1secretMACchallengeauthenticationecashentropyrandomnumberscryptographydigitalsignature
SHA iButton Secrets and Challenges
本地下载

评论