An application from Maxim: Introduction to SHA-256 Master/Slave authentication A new group of secure authenticators and a companion secure coprocessor/1-Wire® master implement SHA-256 authentication. This application note explains the general logistics of this SHA-256-based security system and introduces the bidirectional authentication functionality that the authentication system uses.
Ken from OverEngineered writes us about his recent efforts in reverse engineering, I recently reverse-engineered the security system installed in my house and re-implemented the control board for it using a JeeNode (arduino-compatible with on-board RFM12 radio). I created a post about the reverse-engineering here. And another post about a demo of the wireless Security […]