Passwords in SHA Authentication
时间:2019-12-24
大小:29.54KB
阅读数:350
查看他发布的资源
资料介绍
Abstract: This application note describes techniques that can be used in systems using Maxim SHA iButtons® as network user authentication tokens. These techniques are used to bind user passwords into the SHA-based authentication scheme. The reader should be familiar with the standard Maxim SHA iButton authentication devices and methods. See application note 1201,"1-Wire® SHA-1 Overview," for more information and general applications information. Maxim > App Notes > 1-Wire Devices
Keywords: authentication, user, network, password, passwords, SHA, iButton, iButtons, SHA-1, DS1963S, Feb 22, 2002
DS1961S, DS2432
APPLICATION NOTE 154
Passwords in SHA Authentication
Abstract: This application note describes techniques that can be used in systems using Maxim SHA iButtons
as network user authentication tokens. These techniques are used to bind user passwords into the SHA-based
authentication scheme. The reader should be familiar with the standard Maxim SHA iButton authentication
devices and methods. See application note 1201,"1-Wire SHA-1 Overview," for more information and
general applications information.
Introduction
The Maxim 1-Wire SHA devices provide a highly secure way to be sure that a user iButton token is authentic.
Howe……
版权说明:本资料由用户提供并上传,仅用于学习交流;若内容存在侵权,请进行举报,或
联系我们 删除。