دانلود رایگان مقاله انگلیسی امن کردن بلاک چین برای مقابله با هکرها - الزویر 2018

عنوان فارسی
امن کردن بلاک چین برای مقابله با هکر ها
عنوان انگلیسی
Securing the blockchain against hackers
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
4
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E7707
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات، فناوری اطلاعات و ارتباطات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، رایانش امن، دیتا و امنیت شبکه
مجله
امنیت شبکه - Network Security
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Blockchain technology is transforming the way data is shared and value is transferred. However, there remain significant obstacles that must be overcome before blockchain is ready for mainstream adoption – most notably, security. How to protect both the cryptographic keys that allow access to the ledger and blockchain applications remains a top concern for any organisation or individual interested in using blockchain to transact anything of significant value.

بخشی از متن مقاله

What makes HSMs so strong?


It seems to be obvious that cryptographic operations must be performed in a trusted environment – meaning no possibility of exposure due to viruses, malware, exploits or unauthorised access. But an ordinary wallet mixes the access code, businesslogic and cryptographic calls in one big application. This is a dangerous approach because an attacker can then use crafted data and vulnerabilities to access cryptographic material or steal keys. HSMs are dedicated hardware systems specifically designed to store and manage private and public keys. The entire cryptographic key lifecycle – from provisioning, managing and storing to disposing of or archiving the keys – occurs in the HSM. Digital signatures also may be captured via an HSM, and all access transactions are logged to create an audit trail. An HSM is hardened against tampering or damage and may be located in a physically secure area of a datacentre to prevent unauthorised contact. The module may be embedded in other hardware, connected to a server as part of a network, or used as a standalone device offline. An HSM is a trusted computing environment because it: • Is built on top of specialised hardware, which is well-tested and certified in special laboratories. • Has a security-focused OS. • Limits access via a network interface that is strictly controlled by internal rules. • Actively hides and protects cryptographic material.


بدون دیدگاه