Intro to SHA-256 master/slave authentication
Keywords:SHA-1 authentication intellectual property counterfeiting authenticators
Today a new group of secure authenticators and a companion secure coprocessor implement SHA-256 authentication. This new system provides advanced physical security to deliver unsurpassed low-cost IP protection, clone prevention, and peripheral authentication. This article explains the general logistics of the SHA-256-based security system and introduces the bidirectional authentication functionality which the authentication system utilises.
View the PDF document for more information.
Originally published by Maxim Integrated Products Inc. at www.maxim-ic.com as "Introduction to SHA-256 Master/Slave Authentication".
Related Articles | Editor's Choice |
Visit Asia Webinars to learn about the latest in technology and get practical design tips.