Open Access Open Access  Restricted Access Subscription or Fee Access

Securing Multi-Application Smart Cards with Remote User Authentication and Biometric Identification in Banking Solutions

M. Latha Karthigaa, R.S. Milton

Abstract


The advancement in automation in business has given us the credit card, debit card, health care card, license ID card, etc. It is not viable for an individual to carry multiple cards in her wallet. So, multi-application smart cards sound promising for future technological world to ease the life of an individual. Innovations in technologies bestow us a lot of technical and financial benefits and a supplementary risk in security. To avoid these risks, a secure two-way authentication is required between the card reader and the service provider. The Information which is transferred between the smart card reader and service provider must be in an encrypted form. This achieves both confidentiality and integrity with authentication. Furthermore, an individual‟s unique identification is provided by means of biometrics (fingerprint). This paper introduces a public key cryptographic based security for remote user authentication and one-time transformation for biometric identification.

Keywords


ECC, Authentication, confidentiality, Integrity

Full Text:

PDF

References


Diaa Salama Abdul Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, International Journal of Computer Science and Network Security (IJCSNS), VOL.8 No.12, December 2008.

A.A. Tamimi, ''Performance Analysis of Data Encryption Algorithms” Retrieved October 1, 2008 from http://www.cs.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html

Rajat Moona, “Smart card: Technology for secure management of information”, PPT, IIT Kanpur, 2004.

NIST Researchers, “Recommended Elliptic Curves for Federal Government Use”, NIST, July 1999.

Masood Habib, Tahir Mehmood, Fasee Ullah, Muhammad Ibrahim, “Performance of WiMAX Security Algorithm (The Comparative study of RSA Encryption algorithm with ECC Encryption Algorithm)”, International Conference on Computer Technology and Development, 2009.

William Stallings, ''Cryptography and Network Security,'' Prentice Hall, 2005.

Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength against Attacks." IBM Journal of Research and Development, May 1994,pp. 243 - 250.

Umut Uludug, Sharath Pankanti, Salil Prabhakar, Anil K Jain, “Biometric Cryptosystems: Issues and Challenges”, IEEE 2004.

Hao Li, Peishun Liu, “An Identification System Combined with Fingerprint and Cryptography”, IEEE 2006.

Konstantinos Markantonakis, Keith Mayes, “A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography”, Lecture Notes.

Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu, “A Robust Remote User Authentication Scheme Using Smart Card”, 2009 Second International Symposium on Electronic Commerce and Security.

Specifications for secure hash standard: http://www.csrc.nist.gov/publications/

Yoshifumi Ueshige, Kouichi Sakurai, “A Proposal of One-Time Biometric Authentication”, IEEE 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.