User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar

Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be acces...

Full description

Saved in:
Bibliographic Details
Main Author: Azhar, Muhammad Syahmi
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uitm-ir.69053
record_format uketd_dc
spelling my-uitm-ir.690532022-10-23T13:49:54Z User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar 2017-01 Azhar, Muhammad Syahmi Mobile computing Programming. Rule-based programming. Backtrack programming Computer software Application software Operating systems (Computers) Android Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext. 2017-01 Thesis https://ir.uitm.edu.my/id/eprint/69053/ https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf text en public degree Universiti Teknologi MARA, Terengganu Faculty of Computer and Mathematical Sciences Osman, Mazlan
institution Universiti Teknologi MARA
collection UiTM Institutional Repository
language English
advisor Osman, Mazlan
topic Mobile computing
Mobile computing
Computer software
Application software
Operating systems (Computers)
Android
spellingShingle Mobile computing
Mobile computing
Computer software
Application software
Operating systems (Computers)
Android
Azhar, Muhammad Syahmi
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
description Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext.
format Thesis
qualification_level Bachelor degree
author Azhar, Muhammad Syahmi
author_facet Azhar, Muhammad Syahmi
author_sort Azhar, Muhammad Syahmi
title User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_short User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_full User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_fullStr User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_full_unstemmed User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_sort user authentication and encryption using near field communication (nfc) technology / muhammad syahmi azhar
granting_institution Universiti Teknologi MARA, Terengganu
granting_department Faculty of Computer and Mathematical Sciences
publishDate 2017
url https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf
_version_ 1783735837271261184