2022
DOI: 10.14569/ijacsa.2022.0130221
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Password Hashing on Embedded Systems with Cryptographic Acceleration Unit

Abstract: In this modern world where the proliferation of electronic devices associated with the Internet of Things (IoT) grows day by day, security is an imperative issue. The criticality of the information linked to the various electronic devices connected to the Internet forces developers to establish protection mechanisms against possible cyber-attacks. When using computer equipment or servers, security mechanisms can be applied without having problems with the number of resources associated with this activity; the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
0
0
Order By: Relevance
“…A hash function generates a unique and irreversible output for a given input data, making it suitable for various security applications, including password encryption, image encryption, and digital signatures [1]- [3]. For example, the SHA-256 hash function generates a 256-bit hash value and is commonly used for password storage and digital signature verification [4]. In addition to their conventional use in security applications, hash functions have emerged as a fundamental and integral component of blockchain technology.…”
Section: Introductionmentioning
confidence: 99%
“…A hash function generates a unique and irreversible output for a given input data, making it suitable for various security applications, including password encryption, image encryption, and digital signatures [1]- [3]. For example, the SHA-256 hash function generates a 256-bit hash value and is commonly used for password storage and digital signature verification [4]. In addition to their conventional use in security applications, hash functions have emerged as a fundamental and integral component of blockchain technology.…”
Section: Introductionmentioning
confidence: 99%