On the Security & Design of Mykad
نویسندگان
چکیده
Within 5 years, all Malaysians are expected to have their ICs, driving licenses, passport and e-cash (ATM) all rolled into one card: MyKad. As one of the Multimedia Super Corridor’s (MSC) Multipurpose Smart Card flagships, MyKad will become the most important card that Malaysians carry in their pockets. Therefore, the security of information stored in MyKad should be the emphasis of all parties involved in the design, manufacturing, implementation and applications development of MyKad. In this paper, we discuss the security mechanisms used in MyKad and highlight areas where security analysis should be given the top priority. We also present the rationale for open scrutiny and analysis of MyKad and conclude with some additional recommendations on the security and design of MyKad in the presence of a limited memory capacity.
منابع مشابه
Organizations Adoption of MyKad Initiative
Malaysia has invested multi-million ringgit on the Malaysia’s Multipurpose Identity Card (MyKad) initiative for the protection of citizens from terrorism as well as for effective and efficient government and private sector applications. If it is not used, the initiative is wasted. For the success of MyKad adoption, both individual and organizations need to accept this initiative. Prior studies ...
متن کاملCommunications of the IBIMA
Malaysia has invested multi-million ringgit on the Malaysia’s Multipurpose Identity Card (MyKad) initiative for the protection of citizens from terrorism as well as for effective and efficient government and private sector applications. If it is not used, the initiative is wasted. For the success of MyKad adoption, both individual and organizations need to accept this initiative. Prior studies ...
متن کاملSecurity of Sponge structures
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کامل