MHW-N1911 Eliminating Counterfeits with Elliptic Curve Based Authentication

File uploaded by Lisa Hughes Employee on May 25, 2016Last modified by Renee Fortenberry on Jan 2, 2019
Version 2Show Document
  • View in full screen mode

This session will cover the basics of authentication for anticounterfeit applications. Topics covered include use cases and applications, hardware vs. software, symmetric vs. asymmetric crypto protocols, host and device requirements, attacks and countermeasures, and "beyond the chip" security concerns. An intro to the A1006 and A71 product families will also be provided.

Outcomes