User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be acces...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext. |
---|