2021
DOI: 10.20895/infotel.v13i4.652
|View full text |Cite
|
Sign up to set email alerts
|

Smart card security mechanism with dynamic key

Abstract: As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…These solutions are usually built in with the utilization of PRNG and CRC [15,24]. Moreover, the dynamic keys concept was utilized in [16], where each card has its own unique key and access conditions. Likewise, homomorphic cryptography schemes within the Paillier cryptosystem are perhaps worth considering, especially since this scheme is flexible enough to be used on its own [18] or with other cryptography schemes to scale up to adequate system security storage or authentication abilities [19].…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…These solutions are usually built in with the utilization of PRNG and CRC [15,24]. Moreover, the dynamic keys concept was utilized in [16], where each card has its own unique key and access conditions. Likewise, homomorphic cryptography schemes within the Paillier cryptosystem are perhaps worth considering, especially since this scheme is flexible enough to be used on its own [18] or with other cryptography schemes to scale up to adequate system security storage or authentication abilities [19].…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…The research claims that the parking system business process is carried out automatically with RFID media to enter and exit the parking area. RFID technology is used because transactions can be carried out offline by communicating using an RFID reader, then the security factor is also important to secure the data contained in the RFID so that the data contained is not modified or reproduced [20]. As a result, researchers are trying to use RFID in improving environmental quality and improving production processes.…”
Section: Related Workmentioning
confidence: 99%
“…To ensure that the data read is correct, namely cardholder data, the RFID tag is secured using a dynamic E-mail address: qulis@polinema.ac.id (corresponding author), noprianto@polinema.ac.id https:// journal.uob.edu.bh key where each card has a different key. With the existence of different keys, it is expected to be able to reduce the risk of data duplication or make changes to the data contained in RFID [11].…”
Section: Introductionmentioning
confidence: 99%