Abstract: This application note describes techniques that can be used in systems using Maxim SHA iButtons® as network user authentication tokens. These techniques are used to bind user passwords into the SHA-based authentication scheme. The reader should be familiar with the standard Maxim SHA iButton authentication devices and methods. See application note 1201,"1-Wire® SHA-1 Overview," for more information and general applications information. Maxim > App Notes > 1-Wire Devices
Keywords: authentication, user, network, password, passwords, SHA, iButton, iButtons, SHA-1, DS1963S, Feb 22, 2002
DS1961S, DS2432
APPLICATION NOTE 154
Passwords in SHA Authentication
Abstract: This application note describes techniques that can be used in systems using Maxim SHA iButtons
as network user authentication tokens. These techniques are used to bind user passwords into the SHA-based
authentication scheme. The reader should be familiar with the standard Maxim SHA iButton authentication
devices and methods. See application note 1201,"1-Wire SHA-1 Overview," for more information and
general applications information.
Introduction
The Maxim 1-Wire SHA devices provide a highly secure way to be sure that a user iButton token is authentic.
Howe……