1. 首页
  2. 课程学习
  3. 嵌入式
  4. Securing Electronic Transactions Using SHA-1 Secure Hash Algorithm

Securing Electronic Transactions Using SHA-1 Secure Hash Algorithm

上传者: 2022-09-04 03:33:53上传 PDF文件 48.84 KB 热度 11次

Abstract:Thisarticlediscussestherequirementsforportableelectronicdeviceswithcryptographiccapabilitiestoperformverysecurenetworkauthentication,farecollection,vendingsystemregulation,etc.ItalsoshowshowtheDS1963SorDS1961SiButtons®meettheserequirements,suchassecretprotection,"ZeroKnowledgeProof",andsecurechallenge-responsethroughthesecurehashalgorithm(SHA-1).Maxim>AppNotes>1-WireDEVICESKeywords:securenetwork,authentication,farecollection,vending,secretprotection,secrets,securehashOct21,2002algorithm,SHA,SHA-1,DS1963S,DS1961S,cryptography,cryptographic,challengeresponse,SHA1APPLICATIONNOTE1770SecuringElectronicTransactionsUsingSHA-1SecureHashAlgorithmAbstract:Thisarticlediscussestherequirementsforportableelectronicdeviceswithcryptographiccapabilitiestoperformverysecurenetworkauthentication,farecollection,vendingsystemregulation,etc.ItalsoshowshowtheDS1963SorDS1961SiButtonsmeettheserequirements,suchassecretprotection,"ZeroKnowledgeProof",andsecurechallenge-responsethroughthesecurehashalgorithm(SHA-1).Increasingly,theworldisturningtoportab

用户评论