Research on the Design and Development of a Secure Cold Wallet Device for Blockchain
DOI:
https://doi.org/10.54654/isj.v2i25.1140Keywords:
Cold Wallet, Blockchain, Transaction Signature.Tóm tắt
Cold Wallet is a specialized hardware device designed to store private keys and perform digital signing in an isolated (offline) environment, ensuring maximum security for digital assets. This paper presents a comprehensive design of a secure cold wallet device for Blockchain, focusing on security requirements and cryptographic processing capabilities.
Downloads
References
Ledger, Accessed: 07-Jun-2025, https://www.ledger.com/.
Trezor, Accessed: 07-Jun-2025, https://trezor.io/.
Coldcard, Accessed: 07-Jun-2025, https://coldcard.com/.
Keystone, Accessed: 07-Jun-2025, https://keyst.one/.
Passport, Accessed: 07-Jun-2025, https://bitcoin.org/en/wallets/hardware/passport/.
N. Ivanov, Q. Yan. “EthClipper: A Clipboard Meddling Attack on Hardware Wallets with Address Verification Evasion”, in 2021 IEEE Conference on Communications and Network Security (CNS), IEEE, 2021. DOI: 10.1109/CNS53000.2021.9705033.
Ledger Receive Attack. , Accessed: 07-Jun-2025, https://www.docdroid.net/Jug5LX3/ledger-receive-address-attack.pdf.
Y. Erinle, Y. Kethepalli, Y. Feng, J. Xu. SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets (2025) , Accessed: 07-Jun-2025, https://arxiv.org/pdf/2307.12874.
M. Guri. BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets (2018), Accessed: 07-Jun-2025, https://arxiv.org/pdf/1804.08714.
Phong, T. Q., Chi, D. D., Huy , T. D., & Diep, N. N, “On some issues affecting the security of RSA and ECDSA digital signature schemes”, Journal of Science and Technology on Information Security, vol. 1, no. 18, pp. 38-46. June. 2023. DOI: https://doi.org/10.54654/isj.v1i18.884.
Cam, N. T., Duy, P. N., & Phuc, H. M. T, “Large-scale Android malware detection by integrating Blockchain and IPFS for secure virus signature distribution”, Journal of Science and Technology on Information Security, vol. 1, no. 24, pp. 72-87. June. 2025. DOI: https://doi.org/10.54654/isj.v1i24.1085.
STMicroelectronics, "STM32H723 datasheet", Accessed: 22-Sep-2025, https://www.st.com/resource/en/datasheet/stm32h723zg.pdf.
NIST Special Publication 800-132: “Recommendation for Password-Based Key Derivation”, 2010.
International Organization for Standardization, ISO/IEC 9797–2, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 2: Mechanisms using a hash-function, 2011.
National standard TCVN 14263:2024: Information technology - Security techniques - MKV block cipher algorithm.
FIPS PUB 140-3: Security Requirements for Cryptographic Modules. NIST, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).










