Blockchain Security 2go
Blockchain Security 2Go starter kit to build best-in-class security into your blockchain system design
Storing blockchain user credentials on a computer or a cellphone is extremely risky as an attacker may identify and read out confidential information. This could even be done remotely – through software attacks.
Security can be enhanced by integrating a dedicated Hardware Security Module (HSM) into the device microcontroller. This separates critical operations and credential storage from other software operations and therefore provides robust protection against software attacks.
The highest possible security level can be achieved with a dedicated security controller for critical operations and credential storage. This security controller has additional countermeasures to protect against physical attacks. Infineon’s Blockchain Security 2Go starter kit provides a fast and easy way to build best-in-class security into your blockchain system design.
Blockchain Security 2Go starter kit GitHub repository: https://github.com/Infineon/Blockchain
The Blockchain Security 2Go Starterkit is sold via distribution. Should any claims arise from the purchase of the starter kit, such claims are to be made with the immediate seller of the starter kit. Infineon disclaims all warranties to any indirect purchaser.
INFINEON DISCLAIMS ALL WARRANTIES, WHETHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Infineon is also not liable or responsible for any losses, claims or damages arising from or as a result of intentional misconduct or gross negligence of purchasers, indirect purchasers or third parties.
Infineon highly recommends the user to take appropriate steps against the loss of the private key, whereby loss includes theft, damage or any other event that could impair the user’s ability to use the key. PLEASE REFER TO THE USER MANUAL FOR INFORMATION ON CREATING BACKUPS.
Blockchain can be described as a decentralized digital ledger system that manages a continuously growing list of data points (chain of blocks). Every block in the chain is cryptographically linked to the previous one. Therefore, to change one block, an attacker would have to change the entire chain. All transactions or data points are protected by a digital signature, making it extremely difficult to change or alter them.
Depending on the use case, blockchain transactions can be triggered by people or machines/devices (cars, infrastructure devices, etc.). Typically, all participants can access and verify all data, including the full history of a blockchain. In many applications, this eliminates the need for a central “trusted” authority as well as trust between the participants.
If an attacker gains access to the highly confidential credentials of another user, the attacker would have full control over that blockchain account (currency, assets, ID, contracts, etc.). Similarly, if users lose their credentials, they lose access to all blockchain assets and can no longer use or valorize them. Additionally, transactions and operations stored in a blockchain cannot be simply undone.
In summary, credentials for blockchain access call for the highest possible protection and security. Hardware-based security tokens from Infineon are the most effective way against attacks and unauthorized access.