SLUAAL5 September   2022 BQ26100

 

  1.   Abstract
  2.   Trademarks
  3. 1Introduction
  4. 2BQ26100 and SHA-1 Introduction
  5. 3Risk of Using BQ26100 SHA-1 for Authentication
  6. 4Enhance the Security Level of BQ26100 SHA-1 Authentication
  7. 5Summary
  8. 6References

Abstract

In most electronic products, the system vendor needs to ensure some of sub-systems/sub-units (slave) in the system are original and qualified. For example, the smart phone or notebook maker need to ensure the battery pack are original and qualified. This process is to secure their commercial interests, and secure their brand to avoid any artifact issues, because it will hurt their brand greatly once there is any critical safety issue in the field, for example, smart phone is smoking, catching on fire, or even exploded. So, the system vendor needs to authenticate the sub-systems/sub-units. TI BQ26100 is one dedicated authentication IC, with SHA-1 algorithm. This application note introduces a novel method to enhance the authentication security of BQ26100.