Abstract:Challenge-responsecanbeasecurewayofprotectingaccesstoanyprivilegedmaterialifimplementedcorrectly.Inthisdocument,manyoptionsforchallenge-responseaccesscontrolarediscussedbutthemostsecuremethodgivenispresentingadifferentrandomchallengeoneachaccessattemptandhavingaresponsethatonlythehostcaninterpretwithoutgivingoutanysecrets.ThisdocumentshowswhyMaxim’sSHA-1iButtons®and1-Wiredevicesareidealchoiceswhenimplementingthiskindofchallenge-responsesystem.Maxim>AppNotes>1-WireDevicesiButtonSecurityandAuthenticationKeywords:challenge-response,challenge,randomchallenge,response,SHA,SHA-1,MAC,coprocessor,user,accesscontrol,Mar12,2002authentication,ecash,webaccess,randomnumbergenerator,DS1963S,DS1961S,DS2432,softwarepiracyAPPLICATIONNOTE190ChallengeandResponsewith1-WireSHADevicesAbstract:Challenge-responsecanbeasecurewayofprotectingaccesstoanyprivilegedmaterialifimplementedcorrectly.Inthisdocument,manyoptionsforchallenge-responseaccesscontrolarediscussedbutthemostsecuremethodgivenispresentingadifferentrandomchallengeoneachaccessattemptandhavingaresponsethatonlythehostcaninterpretwithoutgivingoutanysecrets.ThisdocumentshowswhyM
暂无评论