Passwords in SHA Authentication
Abstract:ThisapplicationnotedescribestechniquesthatcanbeusedinsystemsusingMaximSHAiButtons®asnetworkuserauthenticationtokens.ThesetechniquesareusedtobinduserpasswordsintotheSHA-basedauthenticationscheme.ThereadershouldbefamiliarwiththestandardMaximSHAiButtonauthenticationdevicesandmethods.Seeapplicationnote1201,"1-Wire®SHA-1Overview,"formoreinformationandgeneralapplicationsinformation.Maxim>AppNotes>1-WireDevicesKeywords:authentication,user,network,password,passwords,SHA,iButton,iButtons,SHA-1,DS1963S,Feb22,2002DS1961S,DS2432APPLICATIONNOTE154PasswordsinSHAAuthenticationAbstract:ThisapplicationnotedescribestechniquesthatcanbeusedinsystemsusingMaximSHAiButtonsasnetworkuserauthenticationtokens.ThesetechniquesareusedtobinduserpasswordsintotheSHA-basedauthenticationscheme.ThereadershouldbefamiliarwiththestandardMaximSHAiButtonauthenticationdevicesandmethods.Seeapplicationnote1201,"1-WireSHA-1Overview,"formoreinformationandgeneralapplicationsinformation.IntroductionTheMaxim1-WireSHAdevicesprovideahighlysecurewaytobesurethatauseriButtontokenisauthentic.Howe