Page 27 - Cyber Warnings
P. 27







Let’s say that computers and their supporting equipment would use the power from the standard
electrical networks as well as many voltage convertors offering them to work within the
supposed range.

Finally, we would give some illustration explaining how diodes work and suggesting that it’s
quite simple to burn them using the amplified voltage.


The physical disadvantages of hardware solutions

So, we would see above that hardware solutions would deal with some physical limitations
causing them be so sensitive to the higher voltage. That’s practically the point for a reason that
even if terrorist groups deal with the hardware-based encryption or not – it’s possible once they
got located to burn their equipment using the amplified signal.

For instance, if the circuit’s diode suffers its current’s breakthrough or – in other words, if it gets
burned applying the heat which would be the consequence of Joule’s law – it would work as a
short circuit to the entire solution and produce its destruction.


The concluding remarks

The aim of this review got to provide a closer insight to the challenges of hardware-based
encryption especially being used for the terrorist purposes. It appears that our world could be
much securer place to live and work in – once we decide to rely on our scientific findings.

That’s the reason more to combat terrorism and bring the progress to the entire Human Kind.


About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia.

She also serves as a Reviewer at the Journal of Computer Sciences and
Applications and. She writes for American and Asia-Pacific security magazines. She is a
volunteer with the American corner of Subotica as well as a lecturer with the local engineering
society.






27 Cyber Warnings E-Magazine – September 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   22   23   24   25   26   27   28   29   30   31   32