0% found this document useful (0 votes)
7 views

QUT-investigation task-6

Uploaded by

hongsilin1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

QUT-investigation task-6

Uploaded by

hongsilin1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Compare and contrast some new authentication techniques (e.g.

, biometrics, smart
cards, etc.).

Intro

Authentication is the process in which a user or computer has to prove its identity to
the server or client. Authentication is important because it is the first line of defence
against cyber threats and data breaches, protecting sensitive information. Typically, it
entails the use of a username and password. However, with the development in
technology other methods of authentication are on the rise.

Differences between Biometrics and Smart Cards authentication techniques

1, Authentication method

Biometrics authentication method uses the unique biological traits of users to verify
the identity and manage the level of access to the specific file. For example, facial
recognition. An image is captured first and then be used to identity the key facial
features. Then, a unique facial template will be created based on the features
identified above to compare with the stored database.

In comparison, smart card authentication methods provide users a physical smart


card, with a chip that stores authentication data inside. Following the card ‘s
connection with the host computer, the software on the host computer will interact
with the data stored on the smart card to verify user’s identify.

2, Encryption methods

Different encryption methods are used to achieve confidentiality, integrity,


authentication (CIA).

Biometric authentication method relies on symmetric encryption methods to transmit


biometric data securely. For example, AES (Advanced Encryption Standard), which
uses block ciphers with multiple rounds of substitution, shifting and mixing to encrypt
data securely using 128, 192 or 256-bit keys.

However, smart cards rely on cryptographic methods. A commonly used example is


SHA (secure Hash Algorithm) -256. This can generate unique data representations for
authentication protocols, verify the CIA of transmitted data, as well as securely store
the passwords and PINs during the transmission.

Some similarities between smart cards and biometric authentication are how they
both are useful in preventing fraud. Biometric authentication requires the user to
possess a physical characteristic, that only they would have, to authenticate. While
the microchip embedded in the smart card is encrypted making it hard to be
intercepted or tampered with.
Both smart cards and biometric authentication are highly scalable. Meaning that they
can be adapted for small, medium and large organizations. As organisations grow,
using password authentication can cause systems to become more vulnerable. In
contrast, both smart cards and biometric authentication systems can expand without
significant changes to the infrastructure or the level of vulnerability of the
organisation.

Another similarity between biometric authentication and smart cards is that they are
both users friendly. The majority of the time when using a smart card, users have to
either, tap or insert their card into a reader. And with biometric authentication, such
as face or voice recognition users simply have to look at the device or speak a phrase.
Both these authentication methods streamline the process in comparison to
traditional methods such as password or pins and they reduced the risk of human
error of forgetting a pin or password.

Conclusion and Future Development

All in all, biometric and smart card authentication are both secure methods of
authentication for different applications. With biometric authentication being more
widespread in banking, devices, law enforcement, and airport security, whereas smart
cards are used for room access in hotels and businesses, and more recently the Tesla
keys.

In the future, it is expected that both smart cards and biometric authentication will
evolve, with advancements in on-chip cryptography–chips designed to handle
encryption and decryption enhancing security and resistance against cyber threats–
and miniaturisation which is making the cards smaller and still maintaining its
function.

And biometric authentication evolving with advancements in liveness detection –


implementing technology to better ensure that the biometric data is from a live
person, not a fake sample. Multimodal biometric authentication, which aids in liveness
detection, where essentially various biometrics are checked during identity
verification, making it harder for malicious hackers to spoof. However, to fully realise
the potential of biometric authentication, we must mitigate its drawbacks by putting
first user’s privacy and provide them with an informed understanding of what they are
consenting to.

Learning Journey

Sources we found useful were LoginTC and Microsoft, both trusted and accredited
sources which aided us during our research process by providing insightful information
about what biometric and smart card authentication is and how it works.

You might also like