Global Sources
EE Times-India
Stay in touch with EE Times India
 
EE Times-India > Interface
 
 
Interface  

Intro to SHA-256 master/slave authentication

Posted: 18 Jun 2014     Print Version  Bookmark and Share

Keywords:SHA-1  authentication  intellectual property  counterfeiting  authenticators 

For more than 10 years, SHA-1 authentication has been used to effectively protect intellectual property from counterfeiting and illegal copying. As computer technology advances, customers are asking for an even higher level of security.

Today a new group of secure authenticators and a companion secure coprocessor implement SHA-256 authentication. This new system provides advanced physical security to deliver unsurpassed low-cost IP protection, clone prevention, and peripheral authentication. This article explains the general logistics of the SHA-256-based security system and introduces the bidirectional authentication functionality which the authentication system utilises.

View the PDF document for more information.

Originally published by Maxim Integrated Products Inc. at www.maxim-ic.com as "Introduction to SHA-256 Master/Slave Authentication".





Comment on "Intro to SHA-256 master/slave authen..."
Comments:  
*  You can enter [0] more charecters.
*Verify code:
 
 
Webinars

Seminars

Visit Asia Webinars to learn about the latest in technology and get practical design tips.

 

Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

 
Back to Top