Presentation is loading. Please wait.

Presentation is loading. Please wait.

Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.

Similar presentations


Presentation on theme: "Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques."— Presentation transcript:

1 Smart Card Authentication

2 Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques Applications of Smart Card Authentication and their Usage Benefits of Smart Card Authentication

3 What is Smart Card Smart card is important method for authentication It look like a credit card sized plastic which has following parts : Microprocessor Rom, for encryption and decryption and installing operating system

4 Smart Card sub-system Architecture

5 Authentication Techniques Dynamic Password Authentication User Authentication Symmetric key cryptography Asymmetric key cryptography

6 Dynamic Password Authentication Smart Card creates different passwords for each authentication attempt Generates new passcodes many times a day. The host executes the same algorithm as the smart card, so it knows the current valid password at any given time. This method ensures card authenticity as the password keeps on changing dynamically and the algorithm is hard to crack down.

7 User Authentication User authentication associates a smart card to a specific user by employing a personal identification number (PIN). The PIN serves as a password which would be known only to the card holder When the user enters the PIN on the CAD, the CAD transmits the PIN to the smart card The card compares the PIN to the reference number stored in its memory If the value matches then the user is verified

8 Symmetric Key Authentication

9 Asymmetric Key Authentication

10 Applications Secure network access Smart Cards can carry an individual's digital signature. Cellular phones Smart Cards offer a mechanism to secure cellular phones against fraudulent use. Financial The applications of smart cards include their use as credit or ATM cards

11 Benefits 1 Strengthen security The two-factor authentication. Personal identification number. 2. Simple Smart cards are easy to use. No bulky device to break. 3. Secure certificate mobility By placing user certificates on the card they remain on the card even when the user has logged off from the system

12 References www.wikipedia.org www.osti.gov/bridge/servlets/purl/1014 1490-M8bQpq/native/10141490.pdf www.ieee.org http://www.verisign.co.uk/pki/pki- security/smart-card/index.html

13 Thank You


Download ppt "Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques."

Similar presentations


Ads by Google