资料
  • 资料
  • 专题
SHA iButton Secrets and Challenges
推荐星级:
时间:2019-12-24
大小:41.9KB
阅读数:422
上传用户:978461154_qq
查看他发布的资源
下载次数
0
所需E币
3
ebi
新用户注册即送 300 E币
更多E币赚取方法,请查看
close
资料介绍
Abstract: Several applications use the Maxim SHA iButton® tokens for eCash, vending, fare collection, and user authentication. They require the use of secrets to recognize authentic tokens and to secure data and monetary values against tampering. The security of an entire cryptographic system rests with its ability to properly generate and protect its secrets and challenges. This application note describes methods to generate world-class cryptographic secrets and challenges. It also describes the devices that can hold those values where they are safe from attack, and describes schemes where secrets never leave the protected silicon environment at any time and are never subject to compromise. Maxim > App Notes > 1-Wire Devices iButton Security and Authentication Keywords: SHA iButton, SHA-1, secret, MAC, challenge, authentication, ecash, entropy, random numbers, cryptography, digital signature Mar 08, 2002 APPLICATION NOTE 152 SHA iButton Secrets and Challenges Abstract:Several applications use the Maxim SHA iButton tokens for eCash, vending, fare collection, and user authentication. They require the use of secrets to recognize authentic tokens and to secure data and monetary values against tampering. The security of an entire cryptographic system rests with its ability to properly generate and protect its secrets and challenges. This application note describes methods to generate world-class cryptographic secrets and challenges. It also describes the devices that can ……
版权说明:本资料由用户提供并上传,仅用于学习交流;若内容存在侵权,请进行举报,或 联系我们 删除。
相关评论 (下载后评价送E币 我要评论)
没有更多评论了
  • 可能感兴趣
  • 关注本资料的网友还下载了
  • 技术白皮书