The MAC computed by the DSSHA1 or DS2460 applies only to Analog Devices SHA-1 devices. The DSSHA1 memory-mapped SHA-1 coprocessor allows the computational capabilities of the DS2460 to be implemented in an application-specific integrated circuit (ASIC) or field-programmable gate array (FPGA), eliminating the need to develop software to perform the complex SHA-1 computation. Tutorial 3675, " Protecting the R&D Investment with Secure Authentication," explains the Analog Devices authentication solution in the form of secure memories and the DS2460 SHA-1 coprocessor. A thoroughly scrutinized and internationally certified algorithm to compute message authentication codes is SHA-1, which was developed by the National Institute of Standards and Technology (NIST).Īnalog Devices manufactures a series of authentication devices that employ the SHA-1 algorithm. If the originator proves capable of generating a valid MAC for any challenge, it is very certain that it knows the secret and therefore can be considered authentic. The MAC originator must then compute a new MAC based on the secret, message, and challenge and send it back to the recipient. To prove the authenticity of the MAC originator, the MAC recipient generates a random number and sends it as a challenge to the originator. The method involves two entities, the MAC originator and MAC recipient, which share a hidden secret. IntroductionĬhallenge-and-response authentication is based on the computation of message authentication codes (MACs). This application note describes the DSSHA1 synthesizable SHA-1 coprocessor, which can be implemented in an application-specific integrated circuit (ASIC) or field-programmable gate array (FPGA) as alternative to the DS2460 SHA-1 coprocessor or a microprocessor-based implementation. The MAC recipient is the application's host processor. The originator is typically a SHA-1 authenticator or a protected memory with SHA-1 engine. Challenge-and-response authentication requires a MAC originator and a MAC recipient to compute a message authentication code based on a hidden secret and public data.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |