Security of Remote Devices with Personal Identification Card using Biometrics

Size: px
Start display at page:

Download "Security of Remote Devices with Personal Identification Card using Biometrics"

Transcription

1 Security of Remote Devices with Personal Identification Card using Biometrics Ravi Parkash Goela MTech Scholar, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra ABSTRACT: In the present days the world has been relying upon the technology. The advancement in technology has gone to such a level that human being can t even expect a single day without it as human being has became habitual of these technology. Every part of the human life like medicinal, travelling, office, banking, etc. is based on the technology. User authentication systems that are based on knowledge such as password or physical tokens such as ID card are not able to meet strict security performance requirements of a number of modern computer applications. These applications generally use computer networks (e.g., Internet), affect a large portion of population, and control financially valuable tasks (e.g., e- commerce). For improving the security we use the Personal identification cards. Personal identification card can be embedded with the biometric technology which will making it more secure than the earlier systems. Keywords: Biometrics, Cryptography, Mobile System, Smart card, Watermarking. 1. INTRODUCTION Nowadays Technology has made itself a need of the human being. Technology have prevailed itself in the fields like Army, Medical, Banking, Finance, Transportation and many others. As in the world of scientific technologies the technology has gained a big space in human era, where the point has arose to make these information system more secure than earlier. The user authentication system that are based on knowledge such as password or physical tokens such as ID cards are not able to fulfil the complete security requirements of the advanced computer applications. Simple ID cards or the tokens are not enough to secure the system. Conventional smart card invented in 1974 has gone several development phases during the years [1]. Today it is credit-card-sized card equipped with microprocessor, memory and input/output handler. It is a portable, low cost, intelligent device capable of manipulating and storing data. Adding individuals'unique characteristics into smart card chip, smart card becomes more secure medium, suitable for use in a wide range of applications that support biometric methods of identification. There are numerous ID systems implemented worldwide based on biometric smart card and biometric technology Personal Identification cards can solve the problem of security up to an extent, but the biometric technology which has shown its strength in securing the system can solve the problem faced by the personal Identification card. Hence we go for the personal identification card (PIC) embedded with the biometrics. A Biometric system refers to the automatic recognition of individuals based on their physiological or behavioural characteristics. It is generally a pattern recognition system that makes a personal identification by establishing the authenticity of an individual [2]. Nowadays most of the personal applications like banking, mail, social network are synchronized in the mobile systems such that on opening the application it redirects to your page automatically. The numerous applications of ICT over the past few decades have shown its transformative potential and its usage as an important tool for organising political dissent in countries worldwide[3].though this can be a user-friendly approach, when we consider the aspect of privacy and security it is a big setback. Whoever holding your card in your absence can access your details if he knows your password. Though we have password and pattern kind of security in our systems, but how powerful they are? is a million dollar question. The field of government practice has been focusing on the enrolment capabilities and infrastructure rollout, with little focus on smart card applications in the public domain [4].This paper focuses on the authentication scheme which is a combination of Personal Identification Card and the Biometrics for securing the system. 1.1 TYPES OF USER AUTHENTICATION SCHEMES To get the access to the mobile system a person has to be the authenticated user of that mobile system. A person must have enrolled in the database of the mobile system to get the access after verification and validation. There are mainly three types of User authentication schemes:- 1. Knowledge Based 2. Object Based 3. Biometric based

2 User Authentication Types Knowledge Based Object Based Biometric Based Figure1: User Authentication Types Knowledge Based Authentication: In this type of authentication the user have to enter the password during the enrollment and the verification and that password must be alphanumeric in order to keep the system access safe. It is very difficult to remember the alphanumeric password and that password can be stolen or cracked by the hacker. No doubt this authentication scheme has been widely used but it is now an old technique which is also not much secure Object Based Authentication: In this type of authentication technique the user have to carry an ID card in the form of an object. The users have to carry the card with them which can be lost and that lost card can used by the unauthorised user. So loss of this card can be dangerous to the user Biometric Based Authentication: In this type of authentication technique the user don t have to carry the ID cards or to remember the Password or PIN in order to get access to the system. The user itself is a password i.e. the physical and behavioural traits of the user are the password of the mobile system. Biometric trait cannot be lost or forgotten. So the problem of memorising Password and carrying the ID cards has been resolved by the biometrics Personal Identification Biometric Card: This type of authentication is a combination of two types of authentication i.e. Object based authentication and Biometric Based Authentication. The combination of two techniques has accepted the merits of both techniques and gave rise to a new technique named Personal Identification Biometric Card. The combination of the two authentication techniques has improved the security of the mobile systems up to a great extent. 2. Architecture of the Personal Identification card Personal Identification Biometric Card Personal identification card (PIC) works as passive, fixed size, low memory and small microprocessor carrying portable data carrier. Personal identification cards have advanced capability than the simple cards. It has microprocessor and memory that is not present in simple cards. It has electronic circuitry that is not available in the simple cards. When we combine biometrics with Personal identification card then PIC s security is highly enhanced. PIC is thin card with an embedded chip, and this automatically poses its own unique challenges of architectural design.

3 Figure 2: Architecture of Personal Identification Card The main elements of the Personal identification card (PIC) are: 2.1 Central Processing Unit: Central process unit (CPU) is an 8-bit microcontroller but is growing more powerful and has exceeded to 16 and 32-bit chips, that are being used in today s generation electronic techniques. However, all the bit chips don t have multi-threading and other powerful features that are common in standard computers. Personal identification card s CPU executes machine instructions at a speed of approximately 1 MIPS. 2.2 Memory System: There are three main types of memory on cards: 1. RAM. (1K): This is needed for fast computation and response. Only a tiny amount is available. 2. EEPROM (Electrically Erasable PROM) (1 to 24K): Unlike RAM, its contents are not lost when power is off. It is very slow and one can only read/write to it so many (100000) times. 3. ROM (8 to 24K): The Operating System and other basic software like encryption algorithms are stored here. 2.3 Input / Output This is via a single I/O port that is controlled by the processor to ensure that communications are standardized, in the form of APDUs (A Protocol Data Unit). 2.4 Interface Devices (IFDs) IFD or card reader is a supplier of power and clock signal to run program of Personal Identification Card. This obviously means that a Personal identification card is nothing more than a storage device while being warmed in your pocket. The communication channel to a Personal identification card is half-duplex. The receiver is required to sample the signal on the serial line at the same rate as the transmitter sends it in order for the correct data to be received. This rate is known as the bit rate or baud rate. Data received by and transmitted from a Personal identification card is stored in a buffer in the Personal identification card's RAM. 2.5 Operating Systems The operating system found on the majority of PICs implements a standard set of commands (usually 20-30) such as ISO 7816 and CEN 726 to which the PIC responds. Most PIC manufacturers offer cards with operating systems that implement some or this entire standard. The relationship between the PIC reader and the PIC is a master/slave relationship. The reader sends a command to the PIC, the card executes the command and returns the result (if any) to the reader and waits for another command. Microsoft released a miniaturized version of Windows for PICs in late 1998, and early versions of a Gnu O/S have been released. 2.6 File Systems Most operating systems also support a simple file system based on the ISO 7816 standard. A PIC file is actually just a contiguous block. Files are organized in a hierarchical tree format and once a file is allocated, it cannot be extended so files must be created to be the maximum size that they are expected to be. Each file has a list of the users which are authorized to perform different operations on it. There are different types of files: linear, cyclic,

4 transparent, SIM, etc. The usual updation can be performed on all the files allocated. Certain other operations are supported only on particular types of files. 2.7 Card Accepting Device (CAD) PICs do not have the internal power source for their processing as they need an external power source. In PIC reader there is a special device built that is called the card accepting device (CAD). When PIC s golden plate comes into the contact of CAD s metallic pins then PIC get the power for their internal processing of data and then PIC and PIC reader communicate with each other i.e. user and remote machine can communicate with other. 2.8 Programming Languages Most PICs are currently programmed in low-level languages based on proprietary PIC operating systems. Some of the programming has been done in the chip's native instruction set (generally Motorola 6805, Intel 8051, or Hitachi H8). In new Java programmed cards showed up which have a more robust operating system that permits the addition or deletion of application code after the card is issued which makes it incapable. Although memory-efficient programming will still be essential, this greatly increases the pool of programmers capable of creating software for PICs. 3. Authentication in Personal identification cards For the authentication of PICs there are many schemes are available. Lamport proposed the first authentication schemes and Hwang and Li also proposed a remote user authentication scheme. Security of Hwang and Li s scheme is based on the difficulty of the discrete logarithm problem [5]. There are three phases are required in all the cases for authentication. [6] 1. Registration phase. 2. Login phase. 3. Authentication phase. These three phases are used in all the authentication phases. But in the some authentication schemes some advancement are used. (1)Registration phase: Let p large prime number which makes the discrete logarithm problem infeasible. Without loss of generality, we assume that p is of 1024 bits. Let x be a secret key maintained by the system. Assume that a new user Ui submits his identity IDi to the system for registration. The system computes a password Pwi for the user Ui as follow: Pwi = (IDi)x mod p The registration center issues a PIC which contains a pair of public parameters (h, p), where h is the one way hash function. The registration center also delivers Pwi to the user Ui through a secure channel. figure 3. explains the working of authentication system during enrollment. Figure 3: Working of authentication system during enrollment (2)Login Phase If the user Ui wants to login, he attaches his Personal identification card to his input device. Then he keys in his identity IDi, and password Pwi to the device. The Personal identification card will perform the following operations: 1. Generate a random number r. 2. Compute C1= ((IDi)r) modp. 3. Compute t=h (T (XOR) Pwi)mod(p-1), where T is the current date and time of the inputdevice and XOR denotes the exclusive operation.

5 4. Compute M= ((IDi)t) mod p. 5. Compute C2=M ((Pwi) r) mod p. 6. Send a message C= (ID, C1, C2, T) to the remote system. 7. Compute C2=M((Pwi)r). Figure 4: Working of authentication system during Login Figure 4. shows the details of working of authentication system during login. (3)Authentication Phase: After receiving the authentication message C, the system authenticates the login user using the following steps. Assume that the system receives the message C at T, where T is the current day and time of the system. 1. Check the validity of IDi. If the format of IDi is not correct, then the system rejects the login request. 2. Check the validity of the time interval between T and T in order to resist replaying attacks. If (T -T)>= T, where T denotes the expected valid time interval for transmission for transmission delay then the system rejects the login request. 3. Compute Pwi= ((IDi)x) mod p and t=h (T(XOR)Pwi)mod(p-1). 4. If C2 (C1x) -1 mod p=(idi)t mod p, then the system accepts the login request. Otherwise, it rejects the login request. Figure 5: Working of authentication system during Authentication Figure 5. Shows the working of authentication system during authentication For the authentication of the Personal identification cards, in all authentication schemes these three phases are commonly used. 4. Combination of Biometrics & Personal Identification card The biometric template can be embedded with the personal identification card with the technique named Watermarking. During the Enrollment process when the user gives its biometric in the form of sensed image to the authentication system, then the authentication system performs functions like sensing, pre-processing, feature extraction, template generation, template storing. But during verification obtained template are matched with the stored template. If the matching score is above the threshold value then user is authenticated else access is denied. The process can be shown below.

6 Figure 6: Framework of a biometric system The templates generated by the template generator are being embedded into the personal identification card (PIC) by the Watermarking technique. To make the data more secured on the Personal identification card (PIC) we can use the technique named as cryptography. When the biometric template is generated and the personal data is fed into the PIC on both the data some cryptography in the form of encryption scheme is applied. The whole process can be shown below. Figure 7: Methodology showing Combination of PIC and Biometric Conclusion: This paper presents the technique of securing the mobile system with the combination of personal identification card and biometric trait. As it become the necessity to accept the technology in our daily life, so while using the technology we have to be concerned about the security of the system we are using. The access of the Mobile system can be secured with the Passwords, PIN, Tokens, etc. but these are outdated techniques. As the technology is getting advanced we have to adopt advanced technique of authorised access to the system. So the Personal Identification Biometric Card which is a combination of the merits of Identification card and biometrics can be a better and the advanced solution of securing the mobile systems. References: [1] A.K.Das, Analysis and improvement on an efficient biometric based remote user authentication scheme using biometrics, IET Information Security, vol.5, no.3, pp , [2] Chander Kant, Sheetal Verma, Biometric Recognition System: An introduction, published in National level seminar on Convergence of IT and Management on 24 Nov at TIMT, Yamunanagar, [3] Dr. Ali M. Al-Khouri, egovernment Strategies The Case of the United Arab Emirates (UAE), published in European Journal of epractice,no.17, [4] Ali M. Al-Khouri, Triggering the Smart Card Readers Supply Chain, Technology and Investment, 4, pp , [5] Manoj Kumar, Security analysis of a remote user authentication scheme with Personal identification cards, [6] Wiley &Sons, New York, Rankl, W. Effing, W., Smart card Hand Book, 1999.

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

An efficient and practical solution to secure password-authenticated scheme using smart card

An efficient and practical solution to secure password-authenticated scheme using smart card An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

SMART CARDS. Miguel Monteiro FEUP / DEI

SMART CARDS. Miguel Monteiro FEUP / DEI SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged

More information

Types of Peripheral Devices

Types of Peripheral Devices DSB International Public School Rishikesh Class VII Computer Science L1 - More Peripherals A computer peripheral is a device that is connected to a computer but is not part of the core computer architecture.

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

Extending Security Functions for Windows NT/2000/XP

Extending Security Functions for Windows NT/2000/XP Abstract Extending Security Functions for Windows NT/2000/XP Ing. Martin Kákona martin.kakona@i.cz S.ICZ a. s., J. Š. Baara 40, České Budějovice, Czech Republic The paper describes the possibilities of

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

Cryptanalysis of a timestamp-based password authentication scheme 1

Cryptanalysis of a timestamp-based password authentication scheme 1 Cryptanalysis of a timestamp-based password authentication scheme 1 Lizhen Yang a Kefei Chen a a Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, P.R.China

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric

More information

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION S.Pooranachandran 1, E.Aravind 2, D.Bharathipriya 3, A.K.Gokul 4,E.Karthika 5, Department of Electronics and Communication Engineering.

More information

Keywords security model, online banking, authentication, biometric, variable tokens

Keywords security model, online banking, authentication, biometric, variable tokens Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings International Journal of Mathematical Analysis Vol. 8, 2014, no. 43, 2101-2107 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.48269 A New Secure Mutual Authentication Scheme with Smart

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 3 User Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown User Authentication fundamental security building

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

Online Banking Security

Online Banking Security Online Banking Security Fabian Alenius Uwe Bauknecht May 17, 2009 Contents 1 Introduction 2 2 Secure Communication 2 2.1 Password authentication..................... 2 2.2 One-time Passwords.......................

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

HY-457 Information Systems Security

HY-457 Information Systems Security HY-457 Information Systems Security Recitation 1 Panagiotis Papadopoulos(panpap@csd.uoc.gr) Kostas Solomos (solomos@csd.uoc.gr) 1 Question 1 List and briefly define categories of passive and active network

More information

Integrating Password Management with Enterprise Single Sign-On

Integrating Password Management with Enterprise Single Sign-On Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................

More information

Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip

Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip Suitable for multi-purpose multi-application smart cards in the fields such as

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

A flexible biometrics remote user authentication scheme

A flexible biometrics remote user authentication scheme Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing International Journal of Computer Engineering and Applications, Special Edition www.ijcea.com ISSN 2321-3469 Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Smart Card Operating Systems Overview and Trends

Smart Card Operating Systems Overview and Trends Smart Card Operating Systems Overview and Trends Pierre.Paradinas@gemplus.com Gemplus Labs Smart card A piece of plastic with a chip that contains: CPU, memories and programs SC is your personal information

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS Nitin Shinde 1, Lalit Shejwal 2, Uditkumar Gupta 3, Priyanka Pawar 4 1, 2, 3, 4 Department of Computer Engineering, Sinhgad Institute of

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen Smartcards ISO 7816 & smartcard operating systems Erik Poll Digital Security Radboud University Nijmegen 1 Standard for contact smartcards ISO7816 7816-1 Physical characteristics 7816-2 Dimension & size

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

Feature Guide. Sybase mbanking

Feature Guide. Sybase mbanking Feature Guide Sybase mbanking 365 2.1 DOCUMENT ID: DC00785-01-0210-01 LAST REVISED: March 2009 Copyright 2009 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any

More information

A SMART CARD BASED PREPAID ELECTRICITY SYSTEM. M. Wassim Raad 1, Muhammad Sallout 2

A SMART CARD BASED PREPAID ELECTRICITY SYSTEM. M. Wassim Raad 1, Muhammad Sallout 2 A SMART CARD BASED PREPAID ELECTRICITY SYSTEM M. Wassim Raad 1, Muhammad Sallout 2 1 Computer Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia mwraad@ccse.kfupm.edu.sa

More information

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification

More information

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer

More information

Efficient password authenticated key agreement using bilinear pairings

Efficient password authenticated key agreement using bilinear pairings Mathematical and Computer Modelling ( ) www.elsevier.com/locate/mcm Efficient password authenticated key agreement using bilinear pairings Wen-Shenq Juang, Wei-Ken Nien Department of Information Management,

More information

Security Solutions. End-to-end security. Protecting your physical access control system.

Security Solutions. End-to-end security. Protecting your physical access control system. Security Solutions End-to-end security Protecting your physical access control system. www.nedapsecurity.com security common practice Bringing IT best practices to physical security Often, companies don

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information

CPNW Account Creation Instructions

CPNW Account Creation Instructions CPNW Account Creation Instructions 1. Go to www.cpnw.org and click on the register link. We recommend you use a desktop or laptop for registration. Older phones and tablets may cause errors. 2. Enter the

More information

Physical Tamper Resistance

Physical Tamper Resistance Physical Tamper Resistance (Ross Anderson s book Security Engineering - Chapter 16) Tamper: VERB (tamper with) Interfere with (something) in order to cause damage or make unauthorized alterations. someone

More information

Smart Cards. Outline. José Costa Application Domains: Smart Cards. Software for Embedded Systems

Smart Cards. Outline. José Costa Application Domains: Smart Cards. Software for Embedded Systems Smart Cards José Costa Software for Embedded Systems Department of Computer Science and Engineering (DEI) Instituto Superior Técnico Adapted from the overheads for ASE 2009-2010 2011-05-02 José Costa (DEI/IST)

More information

CryptoEx: Applications for Encryption and Digital Signature

CryptoEx: Applications for Encryption and Digital Signature CryptoEx: Applications for Encryption and Digital Signature CryptoEx Products: Overview CryptoEx Outlook CryptoEx Notes CryptoEx Volume CryptoEx Pocket CryptoEx File CryptoEx Office CryptoEx Business Server

More information

Spring 2010: CS419 Computer Security

Spring 2010: CS419 Computer Security Spring 2010: CS419 Computer Security Vinod Ganapathy Lecture 7 Topic: Key exchange protocols Material: Class handout (lecture7_handout.pdf) Chapter 2 in Anderson's book. Today s agenda Key exchange basics

More information

The Password Change Phase is Still Insecure

The Password Change Phase is Still Insecure Manoj Kumar: The password change phase change is still insecure 1 The Password Change Phase is Still Insecure Manoj Kumar!"#$ %&''%% E. Mail: yamu_balyan@yahoo.co.in Abstract In 2004, W. C. Ku and S. M.

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

SafeNet MobilePASS+ for Android. User Guide

SafeNet MobilePASS+ for Android. User Guide SafeNet MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

HumanAUT Secure Human Identification Protocols

HumanAUT Secure Human Identification Protocols HumanAUT Secure Human Identification Protocols Adam Bender Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University What is HumanAUT?! HumanAUT stands for Human AUThentication " Authentication:

More information

Introduction to Electronic Identity Documents

Introduction to Electronic Identity Documents Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional

More information

Smart cards and smart objects communication protocols: Looking to the future. ABSTRACT KEYWORDS

Smart cards and smart objects communication protocols: Looking to the future. ABSTRACT KEYWORDS Smart cards and smart objects communication protocols: Looking to the future. Denis PRACA Hardware research manager, Gemplus research Lab, France Anne-Marie PRADEN Silicon design program manager, Gemplus

More information

International Journal of Scientific Research and Reviews

International Journal of Scientific Research and Reviews Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with

More information

Improved Remote User Authentication Scheme Preserving User Anonymity

Improved Remote User Authentication Scheme Preserving User Anonymity 62 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 28 Improved Remote User Authentication Scheme Preserving User Anonymity Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar

More information

Implementation of Aadhaar Based EVM

Implementation of Aadhaar Based EVM Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table B. Sumitra, Research Scholar, Christ University, Bangalore, India (*Corresponding Author)

More information

BIOMETRIC BASED VOTING MACHINE

BIOMETRIC BASED VOTING MACHINE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE

More information

Computer Memory Basic Concepts. Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University

Computer Memory Basic Concepts. Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University Computer Memory Basic Concepts Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University The Memory Component The memory stores the instructions and data for an

More information

COMPGA12 1 TURN OVER

COMPGA12 1 TURN OVER Applied Cryptography, COMPGA12, 2009-10 Answer ALL questions. 2 hours. Marks for each part of each question are indicated in square brackets Calculators are NOT permitted 1. Multiple Choice Questions.

More information

Undergraduate programme in Computer sciences

Undergraduate programme in Computer sciences What is authentication? Security Engineering MSc in Computer Science EIT Master on Security and Privacy Lecture 12 Authentication Massacci Fabio It is the process of verifying a claimed identity by r for

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Images can be regenerated from quantized biometric match score data

Images can be regenerated from quantized biometric match score data Images can be regenerated from quantized biometric match score data Andy Adler School of Information Technology and Engineering University of Ottawa 1 Problem: Biometrics security Biometric authentication:

More information

11. Security Techniques on Smart Cards

11. Security Techniques on Smart Cards 11. Security Techniques on Smart Cards Dr.-Ing. Martin Novotný Katedra číslicového návrhu Fakulta informačních technologií České vysoké učení technické v Praze c Martin Novotný, 2011 MI-BHW Bezpečnost

More information

Smart Cards. José Costa. Software for Embedded Systems. Departamento de Engenharia Informática (DEI) Instituto Superior Técnico

Smart Cards. José Costa. Software for Embedded Systems. Departamento de Engenharia Informática (DEI) Instituto Superior Técnico Smart Cards José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-11-09 José Costa (DEI/IST) Smart Cards 1 Outline Application Domains: Smart

More information