A SOPHISTICATED RFID APPLICATION ON MULTI –FACTOR AUTHENTICATION GUIDED BY NOUSIN ARUN.M.R REAIEAE007 5/8/2011 1 A sophist...
OUTLINE <ul><li>INTRODUCTION </li></ul><ul><li>WHY THIS TOPIC </li></ul><ul><li>RFID APPLICATION ON MULTI FACTOR AUTHENTIC...
OUTLINE <ul><li>RFAA ENCRYPTION ALGORITHM </li></ul><ul><li>COMPARISION OF CURRENT AUTHENTICATION TECHNIQUES </li></ul><ul...
INTRODUCTION <ul><li>Authentication is the process of verifying a user’s credentials when they are requesting services fro...
WHY THIS TOPIC <ul><li>Technology in our daily lives </li></ul><ul><li>Avoids the information lost through hacking </li></...
RFID APPLICATION ON MULTI FACTOR AUTHENTICATION <ul><li>Authentication is the process of verifying a user’s credentials wh...
SINGLE FACTOR AUTHENTICATION <ul><li>Focuses on only one factor </li></ul><ul><li>Disadvantage is that it proved to be wea...
TWO FACTOR AUTHENTICATION <ul><li>Two factor authentication requires an extra factor while using username/password </li></...
TWO FACTOR AUTHENTICATION <ul><li>Smart card </li></ul><ul><li>  - A successor of magnetic cards </li></ul><ul><li>-They h...
TWO FACTOR AUTHENTICATION <ul><li>Biometrics </li></ul><ul><li>- users may biometrically authenticate via    their fingerp...
TWO FACTOR AUTHENTICATION <ul><li>Security token </li></ul><ul><li>- Security tokens also called OTP tokens </li></ul><ul>...
TWO FACTOR AUTHENTICATION <ul><li>Virtual token </li></ul><ul><li>- first  introduced in 2005 by a security     company </...
TWO FACTOR AUTHENTICATION <ul><li>Software token </li></ul><ul><li>- two primary architecture for software tokens </li></u...
TWO FACTOR AUTHENTICATION <ul><li>SofToken technique </li></ul><ul><ul><ul><li>-  SofToken was firstly introduced in 2010 ...
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY Figure Fig.1 RFID Reader & Tags 5/8/2011 A sophisticated  RFID application on mu...
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY <ul><li>RFID has been widely used in many technological applications today </li>...
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY <ul><li>There are three types of RFID tokens </li></ul><ul><li>- Active tokens <...
RFAA PROCESS <ul><li>RFID technology simply feeds the password into the computer for authentication </li></ul><ul><li>The ...
RFAA PROCESS <ul><li>When request for establishing new user account, the user will receive an RFID token and install clien...
RFAA PROCESS <ul><li>After the completion of registration process, the user can login to the system by only entering usern...
RFAA PROCESS Figure 2 The Login Screen 5/8/2011 A sophisticated  RFID application on multi factor authentication
RFAA ENCRYPTION ALGORITHM Figure 3 Encryption Flow Chart  5/8/2011 A sophisticated  RFID application on multi factor authe...
RFAA ENCRYPTION ALGORITHM <ul><li>Blowfish encryption provides even stronger security to the proposed RFAA technique </li>...
RFAA ENCRYPTION ALGORITHM Figure 4 The Process of Function F 5/8/2011 A sophisticated  RFID application on multi factor au...
<ul><li>Encryption will divide the 80-bits code word </li></ul><ul><li>into two 40-bits data words </li></ul><ul><li>It wi...
COMPARISION OF CURRENT AUTHENTICATION TECHNIQUES <ul><li>Hardware requirement </li></ul><ul><li>Deployment complexity </li...
COMPARISION OF SECURITY MEASURES <ul><li>MitM prevention  </li></ul><ul><li>-  Single factor technique is more venerable t...
MY VIEW ON THIS TOPIC <ul><li>In this IT world the technology found to be computerized </li></ul><ul><li>By increasing the...
CONCLUSION <ul><li>The proposed RFAA technique a two factor authentication for more secure identification </li></ul><ul><l...
REFERENCE <ul><li>J.-C. Liou and S. Bhashyam, A Feasible and Cost-effective Two-Factor Authentication, Proc. 2ndInternatio...
THANKS
Upcoming SlideShare
Loading in...5
×

My ppt

1,167

Published on

Published in: Education, Business, Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,167
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
52
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "My ppt"

  1. 1. A SOPHISTICATED RFID APPLICATION ON MULTI –FACTOR AUTHENTICATION GUIDED BY NOUSIN ARUN.M.R REAIEAE007 5/8/2011 1 A sophisticated RFID application on multi factor authentication
  2. 2. OUTLINE <ul><li>INTRODUCTION </li></ul><ul><li>WHY THIS TOPIC </li></ul><ul><li>RFID APPLICATION ON MULTI FACTOR AUTHENTICATION </li></ul><ul><li>RADIO FREQUENCY IDENTIFICATION TECHNOLOGY </li></ul><ul><li>RFAA PROCESS </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  3. 3. OUTLINE <ul><li>RFAA ENCRYPTION ALGORITHM </li></ul><ul><li>COMPARISION OF CURRENT AUTHENTICATION TECHNIQUES </li></ul><ul><li>COMPARISION OF SECURITY MEASURES </li></ul><ul><li>MY VIEW ON THIS TOPIC </li></ul><ul><li>CONCLUSION </li></ul><ul><li>REFERENCE </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  4. 4. INTRODUCTION <ul><li>Authentication is the process of verifying a user’s credentials when they are requesting services from any secure system </li></ul><ul><li>Most commonly form of authentication is single factor authentication </li></ul><ul><li>The improved technique is multi factor authentication </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  5. 5. WHY THIS TOPIC <ul><li>Technology in our daily lives </li></ul><ul><li>Avoids the information lost through hacking </li></ul><ul><li>Provides more privacy for the user’s information </li></ul><ul><li>Better system for highly confidential information </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  6. 6. RFID APPLICATION ON MULTI FACTOR AUTHENTICATION <ul><li>Authentication is the process of verifying a user’s credentials when they are requesting services from any secure system </li></ul><ul><li>The two forms of authentication are </li></ul><ul><li>-Single factor authentication </li></ul><ul><li>-Multi factor authentication </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  7. 7. SINGLE FACTOR AUTHENTICATION <ul><li>Focuses on only one factor </li></ul><ul><li>Disadvantage is that it proved to be weak method when it comes to protecting data </li></ul><ul><li>One improvement in S-FA is to utilized password management utility </li></ul><ul><li>Insecurity of user’s credentials in single factor authentication can be overcomes by two factor authentication </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  8. 8. TWO FACTOR AUTHENTICATION <ul><li>Two factor authentication requires an extra factor while using username/password </li></ul><ul><li>The second factor takes the form of a physical security token or smart card </li></ul><ul><li>Example of two factor authentication is ATM </li></ul><ul><li>One factor is the use of ATM card issued by the bank </li></ul><ul><li>Second factor is the PIN number </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  9. 9. TWO FACTOR AUTHENTICATION <ul><li>Smart card </li></ul><ul><li> - A successor of magnetic cards </li></ul><ul><li>-They have the same size as credit cards </li></ul><ul><li>-only disadvantage of expensive card reader </li></ul><ul><li>-the smart card and the reader also require </li></ul><ul><li> special middleware application due to the </li></ul><ul><li> mismatch between smart card communication </li></ul><ul><li> standards and the communication protocols </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  10. 10. TWO FACTOR AUTHENTICATION <ul><li>Biometrics </li></ul><ul><li>- users may biometrically authenticate via their fingerprint </li></ul><ul><li>-The device scans, extracts, stores the result </li></ul><ul><li>-comparison is made </li></ul><ul><li>-By sufficient commonality a pass is achieved </li></ul><ul><li>-This technique is expensive </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  11. 11. TWO FACTOR AUTHENTICATION <ul><li>Security token </li></ul><ul><li>- Security tokens also called OTP tokens </li></ul><ul><li>-OTP tokens based on two types of algorithms </li></ul><ul><li>-Time synchronized </li></ul><ul><li>-event based </li></ul><ul><li>-Time synchronized algorithm produces a pseudo random number with a built in pseudo random number generator </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  12. 12. TWO FACTOR AUTHENTICATION <ul><li>Virtual token </li></ul><ul><li>- first introduced in 2005 by a security company </li></ul><ul><li>-virtual tokens are a comparably new concept in multi factor authentication </li></ul><ul><li>-virtual tokens reduce the cost normally associated with implementation and maintenance of multi-factor solutions </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  13. 13. TWO FACTOR AUTHENTICATION <ul><li>Software token </li></ul><ul><li>- two primary architecture for software tokens </li></ul><ul><li>-shared secret </li></ul><ul><li>-public-key cryptography </li></ul><ul><li>-shared secret architecture is considered more vulnerable than the hardware token </li></ul><ul><li>-the configuration file can be compromised if it is stolen and the token is copied </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  14. 14. TWO FACTOR AUTHENTICATION <ul><li>SofToken technique </li></ul><ul><ul><ul><li>- SofToken was firstly introduced in 2010 by Liou and Bhashyam </li></ul></ul></ul><ul><ul><ul><li>- The technique significantly improves on </li></ul></ul></ul><ul><ul><ul><li>feasibility and deployment cost of the two factor authentication </li></ul></ul></ul><ul><ul><ul><li>- SofToken acts as second-factor authentication </li></ul></ul></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  15. 15. RADIO FREQUENCY IDENTIFICATION TECHNOLOGY Figure Fig.1 RFID Reader & Tags 5/8/2011 A sophisticated RFID application on multi factor authentication
  16. 16. RADIO FREQUENCY IDENTIFICATION TECHNOLOGY <ul><li>RFID has been widely used in many technological applications today </li></ul><ul><li>It is both inexpensive and small anywhere </li></ul><ul><li>The main concept of RFID is to retrieve the information stored in the tokens using radio signals </li></ul><ul><li>RFID tags will communicate with an electronic reader to emit radio waves and to receive signals back from the tag </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  17. 17. RADIO FREQUENCY IDENTIFICATION TECHNOLOGY <ul><li>There are three types of RFID tokens </li></ul><ul><li>- Active tokens </li></ul><ul><li>-Passive tokens </li></ul><ul><li>-Battery assisted passive </li></ul><ul><li>The RFID readers and tokens are being used </li></ul><ul><li> for variety of tasks </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  18. 18. RFAA PROCESS <ul><li>RFID technology simply feeds the password into the computer for authentication </li></ul><ul><li>The RFID reader and its respective tokens will act as two factor authentication </li></ul><ul><li>Once a user scans the RFID tags the code word will go through encryption </li></ul><ul><li>The RFAA technique as a more secure form of authentication </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  19. 19. RFAA PROCESS <ul><li>When request for establishing new user account, the user will receive an RFID token and install client application software onto user’s computers </li></ul><ul><li>The user will also receive a unique activation key, along with entering the username/password and scanning the RFID token, to activate the new user account </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  20. 20. RFAA PROCESS <ul><li>After the completion of registration process, the user can login to the system by only entering username/password and to scan the provided RFID token </li></ul><ul><li>This activation key will be also used to enhance portability for providing a user to access the server from non-default computers </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  21. 21. RFAA PROCESS Figure 2 The Login Screen 5/8/2011 A sophisticated RFID application on multi factor authentication
  22. 22. RFAA ENCRYPTION ALGORITHM Figure 3 Encryption Flow Chart 5/8/2011 A sophisticated RFID application on multi factor authentication
  23. 23. RFAA ENCRYPTION ALGORITHM <ul><li>Blowfish encryption provides even stronger security to the proposed RFAA technique </li></ul><ul><li>In RFAA implementation, RFID tokens contain ten-character codeword long and that is exactly 80 bits for the whole string </li></ul><ul><li>Encryption will be applied twice for 80 bits since Blowfish only allows 64 bits per encryption </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  24. 24. RFAA ENCRYPTION ALGORITHM Figure 4 The Process of Function F 5/8/2011 A sophisticated RFID application on multi factor authentication
  25. 25. <ul><li>Encryption will divide the 80-bits code word </li></ul><ul><li>into two 40-bits data words </li></ul><ul><li>It will pad 40 bits to 64 bits during encryption and same procedure takes place for other 40 bits </li></ul><ul><li>Encrypted code into 32 bits since each line represents 32bits </li></ul><ul><li>The algorithm keeps two sub keys arrays; eighteen 32bits of P-array and four 32 bits of S-array </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  26. 26. COMPARISION OF CURRENT AUTHENTICATION TECHNIQUES <ul><li>Hardware requirement </li></ul><ul><li>Deployment complexity </li></ul><ul><li>Portability </li></ul><ul><li>Identity backup </li></ul><ul><li>Lost recovery </li></ul><ul><li>Replacement cost </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  27. 27. COMPARISION OF SECURITY MEASURES <ul><li>MitM prevention </li></ul><ul><li>- Single factor technique is more venerable to this type of attack </li></ul><ul><li>Phishing prevention </li></ul><ul><ul><li>- RFAA scored strong in this category </li></ul></ul><ul><li>Spoofing prevention </li></ul><ul><ul><li>- Single factor authentication less effective </li></ul></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  28. 28. MY VIEW ON THIS TOPIC <ul><li>In this IT world the technology found to be computerized </li></ul><ul><li>By increasing the advantage of portability of information and online transfer of information the risk of hacking is increasing </li></ul><ul><li>By authentication provides the user’s both privacy and security for their information </li></ul><ul><li>Found to be the most indispensable technique in the upcoming years </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  29. 29. CONCLUSION <ul><li>The proposed RFAA technique a two factor authentication for more secure identification </li></ul><ul><li>By using soft token RFAA can be used for both online transactions and computer systems </li></ul><ul><li>The comparison between RFAA and the other techniques indicates that the RFAA scores high due to its ability to maintain a higher level of security for the users </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  30. 30. REFERENCE <ul><li>J.-C. Liou and S. Bhashyam, A Feasible and Cost-effective Two-Factor Authentication, Proc. 2ndInternational Conference on Software Engineering and Data Mining (SEDM ’10), pp. 47 – 51, Chengdu, China, June 2010. </li></ul><ul><li>Bruce Schneier http://www.schneier.com/paper-blowfish-fse.html </li></ul>5/8/2011 A sophisticated RFID application on multi factor authentication
  31. 31. THANKS
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×