Securing Electronic Transactions Using SHA-1 Secure Hash Algorithm
Abstract:Thisarticlediscussestherequirementsforportableelectronicdeviceswithcryptographiccapabilitiestoperformverysecurenetworkauthentication,farecollection,vendingsystemregulation,etc.ItalsoshowshowtheDS1963SorDS1961SiButtons®meettheserequirements,suchassecretprotection,"ZeroKnowledgeProof",andsecurechallenge-responsethroughthesecurehashalgorithm(SHA-1).Maxim>AppNotes>1-WireDEVICESKeywords:securenetwork,authentication,farecollection,vending,secretprotection,secrets,securehashOct21,2002algorithm,SHA,SHA-1,DS1963S,DS1961S,cryptography,cryptographic,challengeresponse,SHA1APPLICATIONNOTE1770SecuringElectronicTransactionsUsingSHA-1SecureHashAlgorithmAbstract:Thisarticlediscussestherequirementsforportableelectronicdeviceswithcryptographiccapabilitiestoperformverysecurenetworkauthentication,farecollection,vendingsystemregulation,etc.ItalsoshowshowtheDS1963SorDS1961SiButtonsmeettheserequirements,suchassecretprotection,"ZeroKnowledgeProof",andsecurechallenge-responsethroughthesecurehashalgorithm(SHA-1).Increasingly,theworldisturningtoportab