The Fundamentals of a SHA-256 Master/Slave Authentication System
Bernhard Linke, Maxim Integrated
EETimes (6/19/2013 12:28 PM EDT)
For more than 10 years, SHA-1 authentication has been used to effectively protect intellectual property from counterfeiting and illegal copying. As computer technology advances, customers are asking for an even higher level of security.
Today a new group of secure authenticators and a companion secure coprocessors implement SHA-256 authentication. This new system provides advanced physical security to deliver unsurpassed low-cost IP protection, clone prevention, and peripheral authentication. This article explains the general logistics of the SHA-256-based security system and introduces the bidirectional authentication functionality which the authentication system utilizes.
To read the full article, click here
Related Semiconductor IP
- SHA-256 Secure Hash Algorithm IP Core
- SHA-256 IP
- SHA256 Encoder and Decoder
- HASH Core, providing MD5, SHA1 and SHA256. Includes DMA and AXI Interface
- HKDF/HMAC/SHA-256/SHA-512, SHA-256 IP Core with Extended Functionalities
Related Articles
- SpiritEd: A Register Specification System integrating IP-XACT and Adobe FrameMaker
- Accurate System Level Power Estimation through Fast Gate-Level Power Characterization
- FPGA based Complex System Designs: Methodology and Techniques
- System Packet Interface (SPI) 4.2 IP Core
Latest Articles
- SCENIC: Stream Computation-Enhanced SmartNIC
- Agentic AI-based Coverage Closure for Formal Verification
- Microarchitectural Co-Optimization for Sustained Throughput of RISC-V Multi-Lane Chaining Vector Processors
- RISC-V Functional Safety for Autonomous Automotive Systems: An Analytical Framework and Research Roadmap for ML-Assisted Certification
- Emulation-based System-on-Chip Security Verification: Challenges and Opportunities