SLUAAL5 September   2022 BQ26100

 

  1.   Abstract
  2.   Trademarks
  3. 1Introduction
  4. 2BQ26100 and SHA-1 Introduction
  5. 3Risk of Using BQ26100 SHA-1 for Authentication
  6. 4Enhance the Security Level of BQ26100 SHA-1 Authentication
  7. 5Summary
  8. 6References

Summary

In this application note, a modified method to enhance authentication security of BQ26100 is introduced.

One more comment on this: almost all of the encryption and authentication technology might be hacked with some special methods. It depends on how much resource, money, and time it takes. The essential purpose of encryption and authentication are to raise the technical barrier and the cost barrier to a high enough level, so that the third party cannot get enough benefit from hacking and artifact.