Embedded Technologies Expo & Conference 2019

SES6: How SHA-3 Cryptographic Authentication Protects Against Substandard Sensor Clones (Room Room 230C)

27 Jun 19
2:55 PM - 3:20 PM
Scott Jones, Maxim Integrated // The rise of substandard sensor clones and device counterfeiting present increasing threats to embedded system integrity and can degrade end-user service-level expectations. As a result, designers are under pressure to guarantee that the sensors inside their devices are genuine and will deliver the most accurate data available. Learn how to use SHA3-256, the latest industry-standard cryptographic hash algorithm, to efficiently reduce the risk of substandard sensor use and device counterfeits.