User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be acces...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.69053 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.690532022-10-23T13:49:54Z User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar 2017-01 Azhar, Muhammad Syahmi Mobile computing Programming. Rule-based programming. Backtrack programming Computer software Application software Operating systems (Computers) Android Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext. 2017-01 Thesis https://ir.uitm.edu.my/id/eprint/69053/ https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf text en public degree Universiti Teknologi MARA, Terengganu Faculty of Computer and Mathematical Sciences Osman, Mazlan |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
advisor |
Osman, Mazlan |
topic |
Mobile computing Mobile computing Computer software Application software Operating systems (Computers) Android |
spellingShingle |
Mobile computing Mobile computing Computer software Application software Operating systems (Computers) Android Azhar, Muhammad Syahmi User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
description |
Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext. |
format |
Thesis |
qualification_level |
Bachelor degree |
author |
Azhar, Muhammad Syahmi |
author_facet |
Azhar, Muhammad Syahmi |
author_sort |
Azhar, Muhammad Syahmi |
title |
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
title_short |
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
title_full |
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
title_fullStr |
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
title_full_unstemmed |
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar |
title_sort |
user authentication and encryption using near field communication (nfc) technology / muhammad syahmi azhar |
granting_institution |
Universiti Teknologi MARA, Terengganu |
granting_department |
Faculty of Computer and Mathematical Sciences |
publishDate |
2017 |
url |
https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf |
_version_ |
1783735837271261184 |