Design of programmable hardware security modules for enhancing blockchain based security framework
نویسندگان
چکیده
Globalization of the chip design and manufacturing industry has imposed significant threats to hardware security integrated circuits (ICs). It made ICs more susceptible various attacks. Blockchain provides a trustworthy distributed platform store immutable records related evidence intellectual property (IP) creation, authentication provenance, confidential data storage. However, blockchain encounters major challenges due its decentralized nature ledgers that contain sensitive data. The research objective is dedicated programmable modules scheme safeguard maintain information contained in networks context IC supply chain. Thus, framework could rely on proposed separate entire cryptographic operations within system as stand-alone units. This work put forth novel approach be considered utilized enhance real-time. critical components secure hash algorithm-256 (SHA-256) elliptic curve digital signature algorithm are designed entities framework. Physical unclonable functions adopted perform transactions blockchain. Relative comparison with existing works clearly depicts upper hand former terms performance parameters.
منابع مشابه
Hardware Security Modules for Embedded Systems
Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directl...
متن کاملHardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments. However, virtualizing TPMs, especially virutalizing the Platform Configuration Registers (PCRs), strikes against one of the...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملAn Overview of Hardware Security Modules
An Overview of Hardware Security Modules This paper intends to introduce the concept of a cryptographic hardware device. It will describe its functions, uses and implementations. It will explain some of the desirable features offered by hardware vendors, as well as examine some of the pitfalls, weaknesses, and disadvantages associated with these types of devices. It will summarize the FIPS 140 ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Power Electronics and Drive Systems
سال: 2023
ISSN: ['2722-2578', '2722-256X']
DOI: https://doi.org/10.11591/ijece.v13i3.pp3178-3191