资料
  • 资料
  • 专题
Securing Electronic Transactions Using SHA-1 Secure Hash Algorithm
推荐星级:
时间:2019-12-24
大小:48.84KB
阅读数:258
上传用户:wsu_w_hotmail.com
查看他发布的资源
下载次数
1
所需E币
3
ebi
新用户注册即送 300 E币
更多E币赚取方法,请查看
close
资料介绍
Abstract: This article discusses the requirements for portable electronic devices with cryptographic capabilities to perform very secure network authentication, fare collection, vending system regulation, etc. It also shows how the DS1963S or DS1961S iButtons® meet these requirements, such as secret protection, "Zero Knowledge Proof", and secure challenge-response through the secure hash algorithm (SHA-1). Maxim > App Notes > 1-Wire DEVICES Keywords: secure network, authentication, fare collection, vending, secret protection, secrets, secure hash Oct 21, 2002 algorithm, SHA, SHA-1, DS1963S, DS1961S, cryptography, cryptographic, challenge response, SHA1 APPLICATION NOTE 1770 Securing Electronic Transactions Using SHA-1 Secure Hash Algorithm Abstract: This article discusses the requirements for portable electronic devices with cryptographic capabilities to perform very secure network authentication, fare collection, vending system regulation, etc. It also shows how the DS1963S or DS1961S iButtons meet these requirements, such as secret protection, "Zero Knowledge Proof", and secure challenge-response through the secure hash algorithm (SHA-1). Increasingly, the world is turning to portab……
版权说明:本资料由用户提供并上传,仅用于学习交流;若内容存在侵权,请进行举报,或 联系我们 删除。
相关评论 (下载后评价送E币 我要评论)
没有更多评论了
  • 可能感兴趣
  • 关注本资料的网友还下载了
  • 技术白皮书