Why Now is a Good Time to Secure Your Embedded Systems with SHA-3

Abstract: Published by the National Institute of Standards and Technology (NIST), Secure Hash Algorithms continue to evolve to provide increasingly stronger levels of cryptography-based security. The latest iteration, SHA-3, has a new internal computational structure as compared to previous NIST-specified hash algorithms to address known vulnerabilities of its predecessors. As embedded systems become smarter and more connected, it’s more critical than ever to safeguard them from attack. SHA-3 can help; however, implementing cryptographic hash functions can be challenging without a background in cryptography. This white paper discusses the merits of SHA-3 and highlights how secure authenticators designed with SHA-3 algorithms and physically unclonable function (PUF) technology can provide strong embedded security without requiring cryptography expertise.

The document you have requested is available in Acrobat PDF format:

Download, PDF FormatAPPLICATION NOTE 6896: Why Now is a Good Time to Secure Your Embedded Systems with SHA-3 (PDF, 3.1MB)

Related Parts
DS2477 DeepCover Secure SHA-3 Coprocessor with ChipDNA PUF Protection Samples  
DS28C36 DeepCover Secure Authenticator Samples  
DS28E50 DeepCover Secure SHA-3 Authenticator with ChipDNA PUF Protection Samples  
MAX14937 Two Channel, 5kVRMS I2C Isolator Samples  
MAX32650 Ultra-Low-Power Arm Cortex-M4 with FPU-Based Microcontroller (MCU) with 3MB Flash and 1MB SRAM Samples  

Next Steps
EE-Mail Subscribe to EE-Mail and receive automatic notice of new documents in your areas of interest.
Download Download, PDF Format (3.1MB)  

© Feb 26, 2019, Maxim Integrated Products, Inc.
The content on this webpage is protected by copyright laws of the United States and of foreign countries. For requests to copy this content, contact us.

APP 6896: Feb 26, 2019
APPLICATION NOTE 6896, AN6896, AN 6896, APP6896, Appnote6896, Appnote 6896