The Fundamentals of a SHA-256 Master/Slave Authentication System
Bernhard Linke, Maxim Integrated
EETimes (6/19/2013 12:28 PM EDT)
For more than 10 years, SHA-1 authentication has been used to effectively protect intellectual property from counterfeiting and illegal copying. As computer technology advances, customers are asking for an even higher level of security.
Today a new group of secure authenticators and a companion secure coprocessors implement SHA-256 authentication. This new system provides advanced physical security to deliver unsurpassed low-cost IP protection, clone prevention, and peripheral authentication. This article explains the general logistics of the SHA-256-based security system and introduces the bidirectional authentication functionality which the authentication system utilizes.
To read the full article, click here
Related Semiconductor IP
- SHA-256 Processor
- SHA-256 IP
- SHA256 & SHA224 core
- SHA-256 Secure Hash Function
- HASH Core, providing MD5, SHA1 and SHA256. Includes DMA and AXI Interface
Related Articles
- SpiritEd: A Register Specification System integrating IP-XACT and Adobe FrameMaker
- Designing FPGA Based Reliable Systems Using Virtex-5 System Monitor
- Chip design lacks system predictability
- DSP system design, part 2: Critical design choices
Latest Articles
- A 14ns-Latency 9Gb/s 0.44mm² 62pJ/b Short-Blocklength LDPC Decoder ASIC in 22FDX
- Pipeline Stage Resolved Timing Characterization of FPGA and ASIC Implementations of a RISC V Processor
- Lyra: A Hardware-Accelerated RISC-V Verification Framework with Generative Model-Based Processor Fuzzing
- Leveraging FPGAs for Homomorphic Matrix-Vector Multiplication in Oblivious Message Retrieval
- Extending and Accelerating Inner Product Masking with Fault Detection via Instruction Set Extension