Progression of Authentication: Comparing Passwords, Passphrases, and Passkeys

Submitted by Staff on

Join Rudy Ramos for a weekly look at all things interesting, new, and noteworthy for design engineers.

In the 1932 Marx Brothers' film “Horse Feathers,” Wagstaff (Groucho), the new college president, visits a speakeasy. Baravelli (Chico) accidentally reveals that the entry password is “Swordfish.” However, after Wagstaff enters and Baravelli exits, Wagstaff alters the password, promptly forgetting it. This mishap results in both being locked out. This early comedy exemplifies, though exaggerated, the flaws in human nature and behavior when it comes to passwords.

Weak passwords have been a consistent issue for data security. According to various studies and reports over the years, weak passwords or reused passwords are often the primary culprits in many data breaches. This week, we take a look at the differences between passwords, passphrases, and passkeys, and how the power of “length” is the key factor for security regardless of whether you use passwords or passphrases.

The Weakest Link

The weakest link in securing digital assets is often said to be the “human element.” Despite advanced technology and sophisticated security protocols, human behaviors, mistakes, and oversights can introduce vulnerabilities that malicious actors can exploit. Among the list of vulnerabilities posed by the human element, poor password practices are near the top. Many people still use weak passwords or reuse passwords across multiple sites and services, making it easier for attackers to gain unauthorized access.

For instance, in 2023, 64% of passwords only contain eight to 11 characters. Nearly 40% of users admit to sharing their personal passwords with others, and 61% of those affected by password hacking had passwords that were shorter than eight characters.

Also, according to the Q2 2023 Cyber-threat Report (April 1 - June 30) by ReliaQuest, a significant spike in ransomware activity was noted, marking it as the quarter with the highest number of victims listed on ransomware data-leak sites. The ransomware group ALPHV, affiliated with “DarkSide” and “BlackMatter,” practices triple extortion: ransomware, data theft, and DDoS attacks. ALPHV employs the AES and ChaCha20 encryption algorithms, targeting operating systems like Windows, ESXi, Debian, and more. They infiltrate systems through vulnerabilities, compromised passwords, or initial access brokers (IABs), using tools such as WebBrowserPassView, Cobalt Strike, and Mimikatz for password acquisition, initial access, and privilege escalation.

Lastly, the average global cost of a data breach in 2023 was a record high $4.45 million. Furthermore, a 2019 study by the Ponemon Institute highlighted that companies in the United States, United Kingdom, Germany, and France spend, on average, around $5.2 million annually responding to password-related issues, revealing the economic impact of weak password practices.

User Authentication

User authentication is critical for online security, and despite education and awareness movements, users still practice poor password etiquette and sometimes fall victim to phishing emails, leading to unauthorized access, malware infections, and data breaches. Also, physical security oversights like losing devices—e.g., laptops or USB drives—or leaving them unattended can lead to data breaches. Without proper cybersecurity training, employees might not recognize potential security threats or understand the best practices to mitigate them.

To address all these human elements, continuous education, training, and cyber security awareness campaigns are nonetheless essential. Tools such as multi-factor authentication (MFA) can also mitigate risks associated with human error. Still, cultivating a security-conscious corporate and personal culture is one of the most effective strategies to protect digital assets.

Authentication Best Practice

Moving towards a security-conscious culture requires rethinking our approaches to authentication. Authentication of login credentials aims to verify an individual's identity, ensuring system access is granted only to legitimate users. Understanding the best practices for the three primary user authentication methods—passwords, passphrases, and passkeys—is crucial to prevent unauthorized system access and thwart potential attackers.

Passwords are user-created character strings, while passphrases are longer, word-based sequences for enhanced security. Passkeys employ public-key cryptography, stored on devices, and use biometrics or security keys as the second authentication factor instead of codes.

The key factor for security, whether using passwords or passphrases, is length. Increasing a password’s length raises the difficulty of brute forcing exponentially. Passphrases have equivalent or better strength than passwords of the same length. Very long, 20+ character passwords or 5+ word passphrases offer protection that may take longer than a human lifetime to crack through brute force alone

The table below shows the estimated brute force crack times for passwords vs. passphrases of different lengths with numbers, upper and lowercase letters, and symbols. Note that estimated times are approximate since crack speed depends heavily on the hacking hardware and techniques. (Source: Author)

Password/Passphrase Length

Estimated Crack Time

8-character password

Seconds to minutes

12-character password

Hours to days

16-character password

Years

20-character password

Centuries

4-word passphrase

Centuries

5-word passphrase

Millennia

6-word passphrase

Millions of years

7-word passphrase

Billions of years

Key Features of Passwords, Passphrases, and Passkeys

Passwords

  • Authentication: Passwords are one of the most common methods for user authentication. They help systems verify the identity of users.
  • Complexity: A strong password typically consists of a mix of uppercase letters, lowercase letters, numbers, and symbols, which make it difficult for unauthorized users to guess or break using various hacking methods.
  • Encryption: In secure systems, passwords are often stored in an encrypted form. When users enter their password, the system encrypts the input and compares it to the stored encrypted version.
  • Use Cases: Passwords are used in various digital contexts, including logging into computers, email accounts, social media platforms, online banking, and more.
  • Security Weaknesses: Because of their widespread use and often weak construction, passwords are a frequent target for cyberattacks, like brute force attacks, dictionary attacks, and phishing. Also, passwords can be hard to remember.
  • Best Practices: It's recommended to have unique passwords for different accounts, regularly update passwords, and avoid using easily guessable information, like birthdays or names.
  • Additional Proof of Identity: Passwords are increasingly being paired with other authentication methods, like two-factor authentication (2FA), to improve security.

Passphrases

  • Length: Passphrases are typically longer than passwords. This added length can make them more secure against brute force attacks.
  • Memorability: Passphrases often consist of multiple words or a sentence, making them easier to remember than complex passwords. For instance, "BlueSkyRainyDay!" is easier to remember than "B$Rd#91!".
  • Usage: Passphrases work well for master passwords or encryption keys.
  • Entropy: Good passphrases have high entropy, meaning they are random and hard to predict. This makes them resistant to dictionary attacks, where an attacker tries every word in the dictionary.
  • Use in Cryptography: Passphrases are often used as the human-memorable component in generating strong encryption keys. For instance, in PGP (Pretty Good Privacy) encryption, a passphrase encrypts the private key.
  • Ease of Typing: Because they are often composed of regular words or sentences, passphrases can be quicker and less error-prone compared to passwords with a mix of characters, numbers, and symbols.
  • Commonality: Not all passphrases are secure. "password1234" is technically a passphrase, but it's not a secure one. Good passphrases should avoid using common phrases or quotations and ideally include a mix of character types (uppercase, lowercase, numbers, symbols) when the system allows.

Passkeys

  • Public-Key Cryptography: Passkeys often relate to cryptographic key pairs consisting of a public key and a private key. The public key can be shared with anyone, while the private key remains confidential.
  • Device-Based: Passkeys can be generated and stored on a user's device, such as a smartphone or hardware security token. Passkeys eliminate password reuse across accounts.
  • Two-Factor Authentication (2FA): In some implementations, passkeys are used as part of a 2FA process. In addition to something you know (like a password), it involves something you have, such as a device that generates or stores a passkey, like a YubiKey.
  • Biometric Integration: Some passkey systems incorporate biometrics as an added security layer. A device might require a fingerprint or facial recognition scan before displaying or using the passkey.
  • Usage in Temporary Authentication: Passkeys can sometimes be temporary or single-use codes generated for the purpose of a specific session or transaction.
  • Avoid Shared Secrets: Unlike passwords, which are shared with the server for validation (though usually in hashed form), passkeys, especially in the context of public-key cryptography, avoid the need to share secrets. The server can verify the user's identity without ever knowing or storing the exact passkey. Passkeys are resilient against phishing and leaks, are easier to use, and are more secure.
     

Featured Products

This week's New Tech Tuesday introduces Microchip Technology's EV97M19A and Swissbit's iShield Key Pro. These two cutting-edge solutions are crafted for those who demand uncompromised security in engineering applications.

The Microchip Technology EV97M19A is a compact mikroBUS™ extension board for showcasing Microchip's SHA104 and SHA105 capabilities. While the SHA104 focuses on accessory-side applications like consumables, the SHA105 caters to host-side needs, enabling mutual authentication. Together, they ensure robust mutual symmetric authentication in commercial and industrial settings.

Designed for seamless integration with the CryptoAuth Trust Platform and other Microchip platforms with a MikroElektronica mikroBUS header, the EV97M19A also supports connection to XPRO header boards via the ATMBUSADAPTER-XPRO. It streamlines the authentication system development with its onboard Microchip devices.

Key features:

  • SHA104 and SHA105 devices with I2C interface for accessory and host-side authentication, respectively
  • Additional SHA104 device with Microchip's unique SWI-PWM interface
  • Convenient parasitic power option for SHA104 and selectable jumper
  • Compact mikroBUS board with pass-through header for extra mikroBUS boards
  • 3V default power with an optional 5V via a 0Ω resistor
  • Onboard power indicator LED

Swissbit's iShield Key Pro (USB-A/NFC) delivers secure, simple, and versatile authentication. This hardware-based solution elevates online account protection against online attacks, such as phishing, social engineering, and account takeover, aligning with Swissbit's reputation for robust data and device security. Tailored for businesses, IT infrastructures, and online service providers, it offers users superior protection for personal and professional online accounts through advanced asymmetric cryptography. Crafted in Berlin's Swissbit factory, the iShield Key Pro boasts impeccable quality and is customizable. It supports NFC for mobile devices and ensures seamless integration with any FIDO2 and U2F compatible platforms, even allowing password-less sign-ins to Windows 10. With its all-in-one design, it fortifies authentication, replaces traditional passwords, and offers options ranging from single-factor to multi-factor authentication.

Key Features:

  • Works with FIDO2 and U2F-compatible websites and services
  • Supports FIDO2 and U2F standards
  • Public and private key cryptography
  • HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible
  • Durable security key with fully molded, robust, and water-resistant housing
  • Tap-and-go authentication with NFC for mobile devices
  • Touch authentication for USB-A interface
  • OS: Windows 10/11, macOS, iOS, Linux, Chrome OS, Android
  • Browsers: Firefox, MS Edge, Google, Chrome, Apple Safari

Takeaway

Passwords are a prevalent part of our lives, and while the incessant requirements to update them can seem tedious, taking authentication seriously is the first step in protecting our data. Weak passwords are a substantial cybersecurity vulnerability that comes at a significant cost. Secure user authentication is paramount in the digital age. Passwords, passphrases, and passkeys play vital roles in ensuring only authorized users access systems. Each offers advantages, but their efficacy hinges on proper use and understanding. Still, regardless of the chosen authentication method, length is a pivotal security factor. A password's length directly influences its resilience against brute force attacks. While there are numerous best practices for authentication, cybersecurity’s greatest defense is password length.  

Original Source: Mouser

About the Author

Rudy is a member of the Technical Content Marketing team at Mouser Electronics, bringing 35+ years of expertise in advanced electromechanical systems, robotics, pneumatics, vacuum systems, high voltage, semiconductor manufacturing, military hardware, and project management. As a technology subject matter expert, Rudy supports global marketing efforts through his extensive product knowledge and by creating and editing technical content for Mouser's website. Rudy has authored technical articles appearing in engineering websites and holds a BS in Technical Management and an MBA with a concentration in Project Management. Prior to Mouser, Rudy worked for National Semiconductor and Texas Instruments.

Have any question realated to this Article?

Ask Our Community Members

Why Global Semiconductor Firms are Reluctant to Invest in AI, IoT Amid Huge Growth Potentials

IoT and AI has the higher chance to escalate R&D expenses, requires a completely skilled workforce, and includes cross-border regulation.

Semiconductors are now the backbone of modern electronic products and are playing an imperative role in our daily lives. They are the building blocks for the integrated circuits, which power everything from computers to smartphones, and every essential home appliance. For the past few decades, technology has evolved tremendously and for instance, artificial intelligence (AI) and Internet of Things (IoT) are playing a pivotal role in almost every industrial sector. The procedure of semiconductor manufacturing includes designing devices and utilizing photolithography to place the circuits accurately on the silicon wafers. 

The chip industry is growing at a rapid pace all over the world and it includes firms that design and produce chip devices and components, including integrated circuits and transistors. The industry has now turned to be highly competitive coupled with major companies investing billions in research and development. Now, the point is that AI is playing an important role in the semiconductor industry. The technology is transforming the sector by improving the design, testing, and manufacturing of chips. 

While speaking of design, AI helps engineers to optimize the architecture of semiconductors and performance by quickly examining the colossal datasets, and at the same time, identifying patterns, that could be an impediment for the engineers to detect. Moreover, AI is now helping the industry’s design pattern and perks-up the potentials of chip-enabled devices. On the other hand, the verification procedure is now completely automated with the help of AI, which ensures the reliability of complex semiconductor designs. The global AI market is forecast to grow to $390.9 billion by 2025, representing a compound annual growth rate of 55.6 percent over that short period.

Image of AI

Akshara Bassi, Senior Research Analyst at Counterpoint told Circuit Digest exclusively, “AI helps in accelerating chip design and development times. At the same time, ML and AI helps analyze large datasets to generate efficient chip architectures. Additionally, they help in simulating the chip performance before it goes to production in the foundry. The simulation can help in tweaks for improved performance and enhanced functionality. Now, if you speak about the role of AI in semiconductor manufacturing or the foundry level, AI helps to activate predictive maintenance by analyzing historical production patterns for lower downtime and increased productivity of site. Additionally, the continual iterative learning process helps in improving yield rate and lower wastage. The growth looks exponential as companies would try to integrate AI into their businesses and processes for faster GTM and lower cost of chip design."

The crucial aspect is how AI is going to impact the global chip production and design. The massive demand of AI will now have a huge impact on this industry because the volume of data stored and processed by AI applications is huge. According to the experts, it is an urgent need of the hour to improve chip architecture in an effort to address the data utilization in AI based integrated circuits. The AI based chip design will be not only about boosting the overall performance, but also about escalating the data movement both in and out of the memory coupled with more augmented power and accurate memory systems. According to an exclusive engineering report published in irds.ieee.org, one option is the design of chips for AI neural networks that perform like human brain synapses. Instead of sending constant signals, such chips would “fire” and send data only when needed. Nonvolatile memory may also see more use in AI-related semiconductor designs. Nonvolatile memory can hold saved data without power. Combining nonvolatile memory on chips with processing logic would make “system on a chip” processors possible, which could meet the demands of AI algorithms.

Semiconductor experts have clearly highlighted that the improvements in semiconductor design are increasing to counter the data demands of AI applications, but they increase a bundle of production and manufacturing hurdles. As the requirement of memories have increased, AI based chips have also increased over the years. The semiconductor size is so huge now, it is not an easy task for a chip vendor to gain profit, while working on specialized hardware. The simple reason is for each application, producing dedicated AI chips becomes very expensive. In order to counter this impediment, a general-purpose AI dais would be useful. It will be easier for the vendors to escalate this general-purpose podium with inputs/outputs, accelerators, and sensors. Manufacturers will be then able to customize the podium for various workload requirements of any application, while also reducing expenses. 

Now, from the perspective of production, this industry will also gain huge benefits from AI adoption. At all the process points, AI will be there to decrease manufacturing time, boosting production efficacies, and decrease material losses. For the past couple of years, the chip industry has earned most of its revenues from the mobile device and smartphone market. The smartphone industry has already hit the peak, the chip industry should find other industries for its growth. The AI applications mostly in industrial robotics, autonomous vehicles, and big data can offer growth opportunities to the chip industry. By defining a new AI strategy, the chip companies can grab the full benefits of the emerging AI market. 

Along with AI, the Internet of Things (IoT) is another important technology, which is very likely to disrupt the chip sector in the business and industrial domains. IoT has the potential to turn almost every device into smart devices starting from retail to consumer products, medical science, and irrigation. Industrial IoTs are in huge demand these days. As the increasing demand for IoT solutions is poised to generate huge revenues, McKinsey Global Institute stated that IoT applications will generate between $4 trillion and $11 trillion globally in 2025. This huge growth offers both complexities and opportunities for the chip industry globally. 

Image of IoT

Mohit Agrawal, Senior Research Analyst who specializes in digital transformation, AI and IoT market told Circuit Digest, “The key areas where IoT is going to make a difference in manufacturing is predictive maintenance, enhancing efficiency, asset tracking, etc. IoT and AI (computer vision) is being used for quality control in a big way. Another concept that is gaining currency is Digital Twin. We can have a digital twin of a machine, system or the entire manufacturing set up. Digital Twins enables us to simulate by taking the real time data into account."

“IoT applications fail to work without integrated circuits and dedicated sensors and therefore, every IoT device is in need of semiconductors. The mobile phone or the smartphone market, which has boosted the chip market for several years, has now finally started taking rest. The chip vendors have the higher chance of grabbing new revenue opportunities with the help of IoT, helping the sector to maintain an average yearly growth rate of 3 to 4 percent in the future. Most importantly, the IoT backed devices would augment demand for integrated circuits, microcontrollers, sensors, memory, and connectivity, which has the higher chance of putting pressure on the current semiconductor supply chain ecosystem,” added Agrawal.

According to some industry sources, who wish to be unnamed, said that IoT applications mostly require a very small microcontroller, which can be embedded in smaller electronics. Therefore, there will be a huge pressure on the semiconductor industry to come out with innovative technology required for small chips, while also maintaining the chip power consumption. There is a possibility that the current base material silicon, which is used in integrated circuits, could be replaced with gallium-arsenide.  

A few researchers still doubt that IoT is going to dominate the international market for chips, because a lot of companies including the renowned ones are putting attention to the R&D of this sector. The major challenge is applying the technology. IoT products have specialized requirements, which have niche markets and very low sales. This thinking has left most of the chip firms to detest billions of dollars investments in IoT. The technology has the higher chance to escalate R&D expenses, requires a completely skilled workforce, and includes cross-border regulation.

Have any question realated to this Article?

Ask Our Community Members

In France, IT Hardware And Electronics Market Is Growing Very Slowly; The Growth Potential In India is Very High

The global electronics market both industrial and IT hardware, is growing at a rapid scale .The government in various countries has framed new strategies and unleashed incentive schemes to grow the ecosystem so that they become self-reliant and less dependent on China. For instance, Europe has a huge automotive manufacturing sector, which is spiking the demand for electronics components in the automotive sector. But, IT hardware manufacturing is not growing in the region.

There is a Lack of an Established & Integrated Supply Chain Infrastructure which is Essential for Cost-Effective Production

Manufacturers these days are not new to automation. Even since the first steam-powered engine was invented, the manufacturing industry has been highly focused on offering top-notch products, and most importantly, through automating processes, reduced operating expenses, and increased quality for more than a decade. Same as the automation, manufacturers have now started deploying artificial intelligence and analytics to data to perk-up efficiency, employee safety, and product quality.

Difference Between Blynk and Sinric Pro

Submitted by Gourav Tak on

In the ever-evolving field of IoT (Internet of Things), platforms like Blynk and Sinric Pro have emerged as key players, Blynk and Sinric Pro are both powerful platforms in the realm of IoT Projects, but they serve distinct purposes and cater to different needs. Let's explore the key differences between Blynk and Sinric Pro, shedding light on their purposes, capabilities, and the experiences they bring to the world of connected devices. You can also check out our article on selecting the right platform for your IoT solution if you are interested. 

1. Purpose and Focus

Blynk: Blynk is a versatile and dynamic IoT platform designed to empower developers and enthusiasts to create personalized mobile applications. Its primary goal is to facilitate the seamless interaction between users and their IoT devices by providing a user-friendly interface for building custom dashboards. Blynk stands out for its adaptability, supporting an extensive range of hardware platforms, including Arduino, Raspberry Pi, ESP8266, and ESP32.

Sinric Pro: Sinric Pro, on the other hand, is specifically tailored for integrating IoT devices integration with voice-controlled platforms. Sinric Pro focuses on enabling users to effortlessly connect their IoT devices with popular voice assistants like Amazon Alexa and Google Home. This specialization sets it apart, positioning Sinric Pro as a dedicated solution for those seeking a voice-centric IoT experience.

2. Integration and Hardware Compability

Blynk: Blynk supports a wide range of hardware platforms, making it compatible with various microcontrollers and development boards, or single-board computers such as Arduino, Raspberry Pi, ESP8266, and ESP32 blynk provides a platform-agnostic environment. This flexibility allows users to choose the hardware that best suits their project requirements.

Sinric Pro: Sinric Pro, while not as hardware-agnostic as Blynk, it’s primarily focuses on integration with Amazon Alexa and Google Home. It provides libraries and tools to easily connect IoT devices to these voice-controlled platforms. While it may support multiple hardware platforms, its main strength lies in voice-enabled interactions.

3. Voice Control

Blynk: Blynk, by default does not provide voice control features. While it offers a great platform for building mobile apps with intuitive interfaces, users interested in voice interactions need to explore additional integrations or solutions outside the Blynk ecosystem.

Sinric Pro: The standout feature of Sinric Pro is its seamless integration with voice assistants. It allows the integration of IoT devices with Amazon Alexa and Google Home, allowing users to command and monitor their devices using voice commands. This can be particularly advantageous for users who prefer a hands-free approach to IoT device management.

4. Use Interface and Ease of Use

Blynk: Blynk is known for its user-friendly drag-and-drop interface, making it easy for developers to create customized dashboards without extensive coding knowledge. The platform emphasizes simplicity and quick prototyping.

Sinric Pro: Sinric Pro, while not focusing extensively on custom dashboards it is designed to simplify the process of integrating IoT devices with voice assistants. Its libraries and examples aim to simplify the development process, especially for users looking to incorporate voice-controlled functionalities without delving into complex coding endeavors.

5. Community and Support

Blynk: Blynk boasts a large and active community of developers and makers. This vibrant community contributes to an extensive collection of tutorials, forums, and resources, making it easier for users to find solutions to common issues.

Sinric Pro: Sinric Pro has a growing community, and its support is geared towards assisting users in integrating their devices with Amazon Alexa and Google Home. While it may not be as extensive as Blynk's community, the platform benefits from regular updates and improvements based on user feedback within its targeted domain.

In summary, Blynk and Sinric Pro serve different purposes within the IoT field. Blynk is a versatile platform for creating mobile applications to control IoT devices, while Sinric Pro specializes in integrating devices with voice-controlled platforms like Amazon Alexa and Google Home. Whether you prioritize a diverse array of hardware compatibility and customizable dashboards go with Blynk or seamless integration with voice assistants then go with Sinric Pro, both platforms contribute significantly to the ever-expanding landscape of IoT possibilities. The choice between the two depends on the specific requirements and preferences of the developer or user.

We have already covered a project on ESP32 Home Automation with Google Assistant & Alexa using Sinric Proyou can check that out if you want to get started with sinric pro. 

Have any question realated to this Article?

Ask Our Community Members

We want to Create a World where People can Easily Work with Robots and Not Like Robots.

Industries have seen an array of growth, which has often come from industrial robotics and automation. What makes factories extremely cumbersome, extremely difficult. At the same time, the adoption of automation itself is a tedious task. Now that’s where Cobots come into picture. It is a technology under the bracket of collaborative automation called Collaborative Robots whose deployment into the factory is a matter of half a day.

“There is a requirement for significant capacity enhancement in the semiconductor sector,” feels Guruprasad Mudlapur, Managing Director of Bosch Limited

When COVID-19 hit the market in the first half of 2020, headlines all over the world surfaced that vehicle demand decreased drastically. But, within a year, there is another concern based on the supply side. Although the demand suddenly escalated globally, a massive slump of automotive semiconductor production had forced the OEMs to halt the manufacturing units.

Despite Lowest Q2 Market Share in Past Three Years, How China is Still Leading the Global EV Race

In an effort to reduce the greenhouse gas emissions and boost the growth of carbon-neutral vehicles, governments throughout the world are unleashing new initiatives, schemes, and legislation. For instance, USA’s bipartisan infrastructure law is looking for a target of 50 percent of new car sales to be electric by the end of 2030, while the European Climate law is looking for a net-zero carbon emissions by the end of 2030. Asian countries such as India, Indonesia, China, Thailand are also adopting the same measures. Currently, Indonesian roads are furnished with 28,000 electric vehicles and they are looking to have 2.5 million EV consumers by the end of 2025. Neighboring countries such as India are also planning to have 30 percent of EV penetration by 2030 and as per the analysis of Rocky Mountain Institute (RMI), the market share could range from 62 percent to 86 percent of total sales.

Of late, global research institute Counterpoint also stated that the Q2 of 2023 witnessed a 50 percent YoY growth of battery electric vehicle (BEV) unit sales, which is mostly spearheaded by North America, Western Europe, and few markets in the Asian region. The point to be noted is that the frail economy of China failed to augment the country’s market during the first quarter and hence, they had a 37 percent YoY growth, which is far below the international average. Nonetheless, the OEMs in China are still leading the market because they enjoyed scale advantages that helped them to grab 56 percent of the international sales.

Archie Zhang, Research Analyst, China said, "BYD Auto, GAC Group and Geely Holdings were three of the world’s top five passenger EV makers last quarter, yet none are household names in the west. They sell most of their cars at home. Chinese OEMs play mainly in the compact or subcompact space with performance and features reflecting this positioning.  They might look sleek but they’re not a Tesla – at least not yet.

But, the International Energy Agency (IEA) has something else to say. According to their analysts, in 2022, 14 percent of cars sold globally were electric, which has increased from 9 percent in 2021. Speaking of international sales, three countries topped the spot. China once again became a market leader as it managed to have 60 percent of international EV sales. Europe, is now the second biggest EV market in the world that had 15 percent sales in 2022, while the US grabbed a sales market share of 8 percent. For 2023, around 2.3 million electric cars were already sold and it seems the volume is likely to escalate by 14 percent by the end of this year.

Vehicle Sales Graph

Again speaking of China, the trend outside the country has shifted to premium models. Analysts have observed that the chunk of passenger EVs sold are highly-priced, deluxe, and bigger in size. Although Tesla is a huge brand in the premium segment, competitors such as Mercedes, Vokswager, Hyundai kia, BMW are also leading the segment. The adoption process is a bit slow because electrification is urging car-makers to reassess manufacturing. Experts believe that premium electric cars will popularize like smartphones in the coming years and is going to provide more services than conventional vehicles.

Brady Wang, Associate Director, Semiconductors and Components at Counterpoint Research said, "Tesla’s brought a new dimension to the automotive industry by tightly integrating advanced hardware with software and electrification. While the traditional OEMs are competing with this level of modernization and sophistication, Tesla is racing to scale down this software-centric approach from luxury to premium and mainstream levels. For most OEMs, they had to start from scratch and play catch up. It's a learning curve on employing cutting edge chips, components, and software and achieving a level of user experience set by Tesla.

The upcoming electric cars require more sophisticated chipset and numerous hardware components such as batteries, power-controllers, sensors, and others. Therefore, securing and sourcing these essentials is extremely imperative to manufacturing e-cars to unlock state-of-the-art experiences. The semiconductor production slump is an ongoing scenario for the past few years and it posed a massive challenge to automobile manufacturers to fight with procurement.

Electric vehicles are poised to completely dominate the global auto market and therefore, the industry is witnessing a new demand cycle spearheaded by swiftly expanding requirements for software capabilities, computing power, and sensors. Currently, the European and the US car-makers are paying more attention to enhanced procurement processes, but speaking of the Chinese OEMs, they could augment the geopolitical tussle as they expand more into the premium EV segment and elevate the computing value chain.

As per the IEA Stated Policies Scenario (STEPS), the current policies formulated by the governments, and OEM's objectives, the future sales shares of EVs are expected to increase by 30 percent in 2030. As per the expectations, China is again likely to lead the Ev market with 40 percent of sales in 2030, the US will have 20 percent share, while Europe will retain its ongoing 25 percent share. The all-new CO2 standards for vehicles by the EU, USA’s Inflation Reduction Act coupled with California's Advanced Clean Cars II rule could provide a 50 percent market share for EVs in 2030, which is as per the national target.

EV Charging Station

IEA’s STEPS further mentioned that the demand of oil for road transportation will soar excessively in 2025, with the amount of oil displaced by electric vehicles exceeding 5 million barrels per day in 2030. In the STEPS, emissions of around 700 Mt CO2-equivalents are avoided by the use of electric cars in 2030. The global announcements on battery manufacturing as of Q1 2023 will be more than enough to meet the growing demand for the industry. Hence, there is a higher probability of having bigger sales shares for EVs than those expected out of government policies and national targets.

Again, speaking of the bigger unit sales in EV, China, which is considered to be the world’s largest market in this industry, witnessed only 37 percent YoY growth in terms BEV sales, far lower than the industry average of 50 percent. It shows there is a slump in the country’s domestic market and the demand is affected by its fragile economy. Tesla and BYD are still dominating the market devoid of any confusion and they around one-third of the in-house unit sales. Interestingly, China’s GAC Motor in a very short period has entered the number three in the competition as the demand has increased and its range of Sedan and Hatchbacks have reduced the price of the cars to a larger extent.

Not only that, there are various domestic mid-level firms in China, which are witnessing good sales volume, which is due to the fact they are equipped with wide-range of vehicles. However, various automobile manufacturers are also facing challenges as the market soothes. The fact is that the vehicle market in China is gigantic, but there are numerous mid-sized car manufacturers and therefore, if the market starts tumbling suddenly, smaller firms will definitely exit.

In an effort to have strong EV unit sales in the coming years, the majority of the Chinese OEMs are looking forward to growth in this industry in other countries and simultaneously grabbing a massive market share in Asia and in Europe. Keeping aside China, currently, the globe’s second largest EV market in Western Europe. SAIC, BYD, and MG are helping to elevate China's EV share in the region owing to its affordable range of vehicles. The old renowned car firms are facing difficulty because they are failing to meet the demand of selling EVs between $20,000 – $40,000 price range. This is why Chinese car-makers are able to dominate the market.

Have any question realated to this Article?

Ask Our Community Members

Nickel-Hydrogen Batteries: A Legacy of NASA’s Space Missions Shaping Modern Energy Solutions

Submitted by Staff on

Since the 1960s, NASA has relied on an old yet dependable technology for powering the International Space Station (ISS), satellites, and other space vehicles: nickel-hydrogen (Ni-H2) batteries (NHBs). These batteries are revered for their durability, long lifespan, and outstanding safety record, even under the most extreme conditions. Let's explore how these batteries function and their potential benefits for modern applications.

Tests conducted on these batteries often involve harsh treatment, such as deliberate perforation using nails or firearms. The results consistently prove the remarkable resilience of NHBs, as there's no explosion, fire, or material ejection—even in cases of hypervelocity impact. The surface temperature remains at a manageable 44 degrees Celsius (112 degrees Fahrenheit) and the pressure and voltage rapidly dissipate, preventing any catastrophic rupture.

Unlike common lithium-ion batteries, NHBs do not develop dendrites, which are tiny metal structures that build upon anodes during charging and can cause short circuits or other failures. This means the batteries can go through approximately 30,000 cycles—or around 30 years of daily use—without compromising their integrity, making them a low-maintenance solution for long-term energy storage.

The battery's chemical makeup is mainly hydrogen and water, meaning they're also environmentally friendly. Additionally, their manufacturing process is straightforward and uses abundant elements, nickel, and hydrogen, thus easing supply chain and cost issues.

Old Tech is New Again

So why is this legacy battery design now relevant again? And why have NHBs and their potential applications been overlooked until now?

Well, despite a 250 percent surge in nickel prices in 2022, the low-maintenance nature and longevity of these batteries potentially save substantial operational costs, particularly for renewable energy storage facilities. Also, when the time comes for disposal, these batteries are almost 100 percent recyclable. But the real reason these legacy batteries have been dormant is cost. Sky high cost! 

But that all might soon change. EnerVenue, a California-based company specializing in energy storage solutions, has embarked on a large grid-scale gigawatt storage facility that will be located in Kentucky and will seek to capitalize on all the potential upsides of using NHBs.

EnerVenue feels that, like the proven technology used by NASA for more than 30 years, their Energy Storage Vessels™ (ESVs) feature an exceptionally long lifespan, eliminating the need for augmentation or oversizing. ESVs can be easily mounted in racks, containers, or stacked in custom warehousing. Their unique chemistry eliminates the need for preventative fire suppression. They can also reliably operate in a wide ambient temperature range without supplementary HVAC. ESVs dramatically reduce operating expenses and feature a much lower cost-per-cycle compared to lithium-ion chemistries.

3/30/30,000: Energy Storage Vessels can cycle up to 3 times per day without rest and boast an expected lifetime of 30 years / 30,000 cycles – enabling unique applications and business models for developers, integrators, and owners. - EnerVenue

The company is addressing the astronomical cost problem primarily by utilizing economies of scale and mass production of their ESVs. These batteries are still pricey, but EnerVenue’s large "gigafactory"—and potential future ones like it—will make them more affordable by eliminating the need for custom designs. By the end of 2023, EnerVenue expects the gigafactory to begin production.

Featured Products

Irrespective of the specific battery design, converting potential energy into electrical energy necessitates the implementation of a resilient and high-efficiency Battery Management System (BMS). This week's New Tech Tuesday highlights the introduction of BMS solution devices by Vishay / Dale and Nexperia.

The HV Intelligent Battery Shunt HV-IBSS-USB from Vishay / Dale is a reference design made to easily evaluate the low Temperature Coefficient of Resistance (TCR) of shunt WSBE8518. It uses a single USB-C connector to provide power to the circuit and to emulate a serial interface so engineers can conveniently make voltage, current, and temperature readings.

Due to the low TCR of the WSBE8518 (maximum ± 10ppm/K for 100μΩ) alongside the choice of low thermal drift components in the analog frontend, this reference design can achieve an overall TCR of approximately 44ppm/K max. without thermal compensation over the whole temperature range. The device is factory calibrated (values stored in onboard EEprom) to allow for current measurements with 0.2 percent and thermal drift for currents in the range of ±500A.

The TCR is a crucial parameter in current sensing measurements, especially in applications like BMS that involve monitoring and managing current flow in various components, including battery shunts. TCR indicates how a material's electrical resistance changes with changes in temperature. It's expressed as a fractional change in resistance per degree Celsius change in temperature (ΔR/R0 per °C), usually in parts per million per degree Celsius (ppm/°C).

In BMS, TCR plays a significant role for several reasons, including the precise measurement of current flowing into and out of the battery, as well as throughout the battery system. This is essential for monitoring the state of charge (SoC) and state of health (SoH) of the battery. TCR helps compensate for changes in resistance due to temperature variations, allowing for more accurate and consistent current measurements. Additionally, accurate current measurements enable the BMS to detect anomalies and potentially hazardous conditions like overcurrent situations, which can lead to thermal runaway or other safety risks. By compensating for temperature effects, the BMS can respond appropriately to changes in current flow, enhancing the overall safety and efficiency of the battery system.

Nexperia eMode GaN FETs offer a voltage range of 100V to 650V and superior ultra-high frequency switching performance. These general-purpose enhancement mode (eMode) Gallium Nitride Field-Effect Transistors (GaN FETs) deliver fast transition and switching capability with minimal conduction and switching losses.

Enhancement mode FETs are "normally-off," meaning that by default, the transistor is in an "off" state until a specific voltage to its gate terminal is applied, activating the transistor and letting current flow. This type of GaN FET is commonly used in power electronics because it's safer and more predictable—if there's no voltage applied, it stays off, reducing the risk of accidental current flow.

These power FETS are available in a DFN 8mm x 8mm surface mount package. Applications include high power density and high-efficiency power conversion, AC-to-DC and DC-to-DC converters, fast battery charging, and motor drives. For 650V and ≤ 150V industrial and consumer applications, Nexperia e-Mode GaN FETs provide the balance between switching performance and robustness.

Tuesday’s Takeaway

Nickel-hydrogen batteries, despite being old technology, continue to prove their worth, especially in the renewable energy sector. Although their initial cost is high due to the use of expensive metals, advancements in mass production and the potential for cost-saving through their durability and longevity make them an attractive option as energy storage vessels for companies like EnerVenue. As we gear towards more sustainable energy solutions, it's crucial to revisit and optimize tried-and-true technologies like NHBs, which have been quietly powering our space missions for decades.

In the realm of battery management, Vishay / Dale and Nexperia present solutions like the HV Intelligent Battery Shunt, which leverages TCR technology for current sensing measurements to ensure accurate current monitoring while enhancing battery safety and efficiency. Nexperia’s eMode GaN FETs represent a safer and more predictable option in high-power density electronics, designed to remain off until activated, thereby reducing the risk of unintended current flow. These FETs offer efficient power conversion in various applications, showcasing a balance between switching performance and robustness.

Innovation continues to merge lessons from NASA's legacy technology with modern applications, providing solutions that bridge the gap between reliability, sustainability, and efficiency in energy storage and management.

Original Source: Mouser

About the Author

Rudy is a member of the Technical Content Marketing team at Mouser Electronics, bringing 35+ years of expertise in advanced electromechanical systems, robotics, pneumatics, vacuum systems, high voltage, semiconductor manufacturing, military hardware, and project management. As a technology subject matter expert, Rudy supports global marketing efforts through his extensive product knowledge and by creating and editing technical content for Mouser's website. Rudy has authored technical articles appearing in engineering websites and holds a BS in Technical Management and an MBA with a concentration in Project Management. Prior to Mouser, Rudy worked for National Semiconductor and Texas Instruments.

Have any question realated to this Article?

Ask Our Community Members