Keywords: DeepCover, SHA-256, master authentication, slave authentication, mutual authentication, security, authentication protection,1-Wire, SHA-1, MAC, ROM ID
Related Parts

The Fundamentals of a SHA-256 Master/Slave Authentication System

Abstract: Maxim’s DeepCover® Secure Authenticators (DS2465, DS28E15, DS28E22, DS28E25) implement advanced physical security to provide the ultimate in low-cost IP protection, clone prevention, and peripheral authentication. This application note first introduces the authenticators and the coprocessor with their specific characteristics and commands. Then it explains the general logistics of the SHA-256-based security system. Finally, it illustrates the use of an authenticator and a coprocessor to perform mutual authentication of the master and the slave in a real application.

This document is written for a highly specific application and contains information about proprietary technology, and is only available to customers whose requirements closely match the application. To request the full document, please complete the form below.

The application note you have requested requires the following contact and project information:

Contact Information

Name: *
Company: *
Company division
Title/Position: *
Address: *
City: *
Postal Code: *
Country: *
Email Address: *
Email Address (Confirm): *
Phone Number: *

Your Project

Project Name: *
Project Description and Application: *
Projected Volume: *
Estimated Design Freeze Date: (optional)
Estimated Product Start Date: (optional)
* = Required

APPLICATION NOTE 5546, AN5546, AN 5546, APP5546, Appnote5546, Appnote 5546