The object of the research is the security of the file system of a single-board platform. As part of the research reported in this paper, a method has been proposed to protect the file system using encryption. Implementing a Linux Unified Key Setup paired with a password or Universal Serial Bus key has been demonstrated. The advantages of Linux Unified Key Setup for this task and the possibilities for system configuration and encryption method depending on the use case and hardware configuration has been outlined. As a result, the administrator of a single-board computer can store and work with sensitive information in a more secure environment. This will allow the user to be sure that their private information will not be accessible in case of theft or attempted hacking of the device.
- LUKS On-Disk Format Specification. Available at: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/LUKS- standard/on-disk-format.pdf (accessed on 14 October 2024).
- Linux Unified Key Setup (LUKS) Disk Encryption Available at: https://wiki.archlinux.org/title/Dm-crypt/ Encrypting_an_entire_system (accessed on 14 October 2024).
- Optimized Implementation of Argon2 Utilizing the Graphics Processing Unit. 10.48550/arXiv.1602.03097. Iuorio, Andrea & Visconti, Andrea. (2019). Understanding Optimizations and Measuring Performances of PBKDF2. 10.3390/app13169295
- Lee, Sung-Won & Sim, Kwee-Bo. (2021). Design and Hardware Implementation of a Simplified DAG-Based Blockchain and New AES-CBC Algorithm for IoT Security. Electronics. 10. 1127. 10.3390/electronics10091127.
- Cano Quiveu, German & Ruiz-de-clavijo-Vazquez, Paulino & Bellido, Manuel & Juan-Chico, Jorge & Viejo Cortes, Julian & Guerrero, David & Ostúa, Enrique. (2021). Embedded LUKS (E-LUKS): A Hardware Solution to IoT Security. Electronics. 10. 3036. 10.3390/electronics10233036.
- Performance Analysis of Encryption Algorithms in Named Pipe Communication for Linux Systems. 10.55549/epstem. 1518789
- Saleh, Shaimaa & Al-Awamry, Amr & Taha, Ahmed. (2024). Tailoring AES for resource-constrained IoT devices. Indonesian Journal of Electrical Engineering and Computer Science. 36. 290. 10.11591/ijeecs.v36.i1.pp290-301.
- Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units. 10.3390/math8111894
- Banakh, Roman. (2018). AUTHENTICATION METHOD WPA/WPA2 KEY PARAMETERS’ DEFINITION FOR IEEE 802.11 BASED HONEYPOT. Radio Electronics, Computer Science, Control. 110-118. 10.15588/1607-3274- 2018-1-13.
- Raspberry PI Official Site. Available at: https://www. raspberrypi.com/ (accessed on 14 October 2024).
- Byun, Hyeonsu & Kim, Jueun & Jeong, Yunseok & Seok, Byoungjin & Gong, Seonghyeon & Lee, Changhoon. (2024). A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks. Electronics. 13. 2433. 10.3390/electronics13132433.
- Proxy Nova - Password Brute Force Calculator. Available at: https://www.proxynova.com/tools/brute-force-calculator/ (accessed on 14 October 2024).