SHA-1 is a Secure Hash Algorithm (SHA) with a cryptographic strength of 80 bits. The algorithm was designed by the U.S. National Security Agency and is published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard. It has been widely adopted for use in many applications that require secure authentication.
The algorithm consists of a very complex set of functions, which results in a one-way hash. This allows the algorithm to provide authentication without secrecy, meaning an encrypted communication channel is not required.
A simplified schematic of how a SHA-1 authentication works.
The algorithm itself is complex, and a full explanation and documentation can be found here.
|Application Note||4784||Secure Access Control Through Challenge and Response Authentication|
Unfortunately, we are unable to place your order due to restrictions on your account. Please contact firstname.lastname@example.org
Sorry, but we are unable to process sample requests from non-business or non-educational e-mail addresses via this site. Your options are :
Thank you for your interest in Maxim
Thank You for interest in Maxim Integrated. Our free samples program limits the quantities that we can provide to each customer per calendar year.If you feel that you have received this message in error, please contact email@example.com. Alternatively, you can click here to place an order.
|Part Number||Description||Key Advantages|
Are you sure you want to Request Company Account?