User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar

Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be acces...

Full description

Saved in:
Bibliographic Details
Main Author: Azhar, Muhammad Syahmi
Format: Thesis
Language:English
Published: 2017
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf
https://ir.uitm.edu.my/id/eprint/69053/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.69053
record_format eprints
spelling my.uitm.ir.690532022-10-23T13:49:54Z https://ir.uitm.edu.my/id/eprint/69053/ User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar Azhar, Muhammad Syahmi Mobile computing Programming. Rule-based programming. Backtrack programming Computer software Application software Operating systems (Computers) Android Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext. 2017-01 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar. (2017) Degree thesis, thesis, Universiti Teknologi MARA, Terengganu.
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Mobile computing
Programming. Rule-based programming. Backtrack programming
Computer software
Application software
Operating systems (Computers)
Android
spellingShingle Mobile computing
Programming. Rule-based programming. Backtrack programming
Computer software
Application software
Operating systems (Computers)
Android
Azhar, Muhammad Syahmi
User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
description Smartphones with advanced mobile operating has become mainstream both in business and personal purpose. Thus, it contains a lot of private data such as detail about their owners, personal chats, passwords or bank account details. It is absolutely necessary to make sure that the phone should be access by the authorize users. During the research findings, there are a lots of weakness with the current authentication such as in biometric authentication, there is possible that it cannot read our finger accurately if our finger get too oily or dirt. Therefore, this project will create another way as an alternative for authentication process that will used Near Field Communication (NFC) technology to authorize user. To achieve the necessary security a cryptographic concepts such as authentication and encryption algorithm are used. Encryption is used to encryption user personal information such as name, email and phone number which will produce a ciphertext. These ciphertext will be stored to phone and NFC tag and will be used later for authentication process. Once the apps has been installed and service background is running, a NFC tag is required to perform the user authentication process. The phone can be unlocked if it has been authorized NFC tag and successfully authenticate the ciphertext.
format Thesis
author Azhar, Muhammad Syahmi
author_facet Azhar, Muhammad Syahmi
author_sort Azhar, Muhammad Syahmi
title User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_short User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_full User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_fullStr User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_full_unstemmed User authentication and encryption using Near Field Communication (NFC) technology / Muhammad Syahmi Azhar
title_sort user authentication and encryption using near field communication (nfc) technology / muhammad syahmi azhar
publishDate 2017
url https://ir.uitm.edu.my/id/eprint/69053/1/69053.pdf
https://ir.uitm.edu.my/id/eprint/69053/
_version_ 1748183944713469952
score 13.159267