2020
DOI: 10.20998/2079-0023.2020.01.14
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Systems of Modeling of Microcontrollers With Additional Modules of Cryptographic Information Protection

Abstract: The field of application of the protected microprocessor systems includes information security functions: authentication of subjects and objects of information interaction, information encryption, integrity control, access control, key management. Today, the urgent task is to establish the security of microprocessor-based systems using a variety of computer simulation software environments. The work analyzes the most effective and affordable

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
(1 reference statement)
0
2
0
Order By: Relevance
“…In addition, Malamas, Dasaklis, Voutsinas, and Kotzanikolaou [6,7], [8,9] have explored the integration of blockchain architecture as a service layer into existing ERP systems, improving access control and data integrity to enhance interoperability between supply chain stakeholders. This proposal reflects the growing trend of using distributed ledger technologies to ensure data integrity and trust in IoT ecosystems, addressing issues related to data tampering and unauthorized access.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, Malamas, Dasaklis, Voutsinas, and Kotzanikolaou [6,7], [8,9] have explored the integration of blockchain architecture as a service layer into existing ERP systems, improving access control and data integrity to enhance interoperability between supply chain stakeholders. This proposal reflects the growing trend of using distributed ledger technologies to ensure data integrity and trust in IoT ecosystems, addressing issues related to data tampering and unauthorized access.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The use of cryptographic accelerators increases the speed of encryption by the AES algorithm compared to its software implementation in 8/16-bit microcontrollers by 10-20 times, and in 32-bit microcontrollersup to 150 times. At the same time, the speed of hash algorithms SHA-256 with hardware implementation in 32-bit microcontrollers increases 100 times, and for hash algorithms НМАСup to 500 times [11].…”
Section: Introductionmentioning
confidence: 99%