SHA
iButton Secrets and Challenges
关键词: SHA iButton, SHA-1, secret, MAC, challenge, authentication, ecash, entropy, random numbers, cryptography, digital signature
Abstract: Several applications use the Maxim SHA iButton® tokens for eCash, vending, fare collection, and user authentication. They require the use of secrets to recognize authentic tokens and to secure data and monetary values against tampering. The security of an entire cryptographic system rests with its ability to properly generate and protect its secrets and challenges. This application note describes methods to generate world-class cryptographic secrets and challenges. It also describes the devices that can hold those values where they are safe from attack, and describes schemes where secrets never leave the protected silicon environment at any time and are never subject to compromise.
SHA iButton Secrets and Challenges.pdf