App note: Secure hash algorithms back to basics

Maxim Integrated’s introduction to SHA security. Link here (PDF) This application note goes over the basics of Secure Hash Algorithms (SHA) and discusses the variants of the algorithm. It then briefly touches on how the algorithm is used for authentication, including the concept of a Hashed Message Authentication Code (HMAC). It concludes by looking at […]