2017年6月30日星期五

Security of private key in Blockchain

00

How to protect the security of the cryptosystem, private key takes a great role in their life cycle, which means the bedrock of the trusted Blockchain. As the proverb goes, all encryption without key protection is rogue.
There are a few link in Blockchain private key, including the generation, storage, usage, recovered, destroy, update and so on.
  • The generation security of private key
The private key of Blockchain is the asymmetric algorithm, their self quality of private key has determined the quality of nonce for the private key.
Nonce is the cornerstone of information security system based on modern cryptography, and the security for the whole system is completely rely on the generation efficiency and quality of the nonce. The core of the high quality nonce is the unpredictability. And for the nonce, it can divide into two types: pseudo-random and really-random.
A pseudorandom process is a process that appears to be random but is not. Pseudorandom sequences typically exhibit statistical randomness while being generated by an entirely deterministic causal process. Such a process is easier to produce than a genuinely random one, and has the benefit that it can be used again and again to produce exactly the same numbers, which is useful for testing and fixing software.
A reallyrandom which is based on the design of hardware, according to the facters of outside temperature, voltage, electromagnetic field, environment noise, the unpredictability of random generation has been improved.
  • Secure storage of private key
The storage and usage of private key can be divided into soft implementation and hardware implementation.
Soft implementation means the way for storage and usage in the form of soft. When a new private key generated, it can be stored in user terminal or managed in server  as a file or character string. When needed, it can be obtained through the watchword from the relating plaintext into the memory, then finish the computing of private key by CPU. However, this way still has various security risks.
Hardware implementation is relying on the special cipher security chip or cryptoequipment, which owns the mechanisms of physical protection, sensitive data protection and key protection, to ensure the generation of private key by the special hardware. The private key should not be appeared outside the cryptoequipment in the form of plaintext.
  • Blockchain VS PKI/CA
Even the blockchain technology is just started, the  Blockchain security architecture based on modern cryptography has developed several decades. For the protection of the private key in the life cycle, PKI/CA using the soft implementation as well sa Blockchain. As for the private key security of Blockchain, Blockchain industry can draw lessons from PKI/CA, using the industry chain to enhance the security of private key, then to construct a perfect security system.
Shuqin tech has developed an open middle tier, by fusion up the technical advances for blockchian and overcome the capacity issue of public blockchain we provided a “Blockchin+” technical solutions, and established a trustworthy electronic certificate service platform - Baoquan.com. They also have the strong security technology for data security and are still working on the exploring for more Blockchain solutions.
For more solutions: https://www.baoquan.com/en/

hiring

If you are a Blockchain developer, if you are familiar with IBM Hyerledger, Ethereum, siacoin or bitcoin, if you are good at golang language, if you wanna change your position, if you wanna fight in Blockchain field, if you are seeking for a better life, please contact us: js@baoquan.com

没有评论:

发表评论