2022
DOI: 10.1016/j.jisa.2022.103332
|View full text |Cite
|
Sign up to set email alerts
|

A portable hardware security module and cryptographic key generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Not knowing the new solution, suspicions were raised at the beginning of its use, but as the authentication method was used and understood, the number of those who gained confidence and wanted to use it increased. The main cause of data breaches in business is default or weak passwords [34]. The highest percentage of company data breaches is due to weak passwords, according to Verizon's 2021 Report on Data Breach Investigations [35].…”
Section: Analyzing the Impact Of The Developed Methodsmentioning
confidence: 99%
“…Not knowing the new solution, suspicions were raised at the beginning of its use, but as the authentication method was used and understood, the number of those who gained confidence and wanted to use it increased. The main cause of data breaches in business is default or weak passwords [34]. The highest percentage of company data breaches is due to weak passwords, according to Verizon's 2021 Report on Data Breach Investigations [35].…”
Section: Analyzing the Impact Of The Developed Methodsmentioning
confidence: 99%
“…The authors have demonstrated the efficacy of SRAM-PUF in safeguarding keying materials of Zig Bee devices, Whether through the generation of secret keys or the secure storage of secret keys in the NVM of the local device, with no requirement for the installation of additional equipment. The proposed HSM in [32] eliminates by storing cryptographic keys and the susceptibility to attacks against these stored keys is eliminated. The HSM generates the cryptographic key from sub-components exhibiting similar to multi-factor authentication, where each factor is an independent authenticator.…”
Section: B Secure Key Storagementioning
confidence: 99%