On the Security & Design of Mykad

نویسندگان

  • Raphael C.-W. Phan
  • Lawan A. Mohammed
چکیده

Within 5 years, all Malaysians are expected to have their ICs, driving licenses, passport and e-cash (ATM) all rolled into one card: MyKad. As one of the Multimedia Super Corridor’s (MSC) Multipurpose Smart Card flagships, MyKad will become the most important card that Malaysians carry in their pockets. Therefore, the security of information stored in MyKad should be the emphasis of all parties involved in the design, manufacturing, implementation and applications development of MyKad. In this paper, we discuss the security mechanisms used in MyKad and highlight areas where security analysis should be given the top priority. We also present the rationale for open scrutiny and analysis of MyKad and conclude with some additional recommendations on the security and design of MyKad in the presence of a limited memory capacity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Organizations Adoption of MyKad Initiative

Malaysia has invested multi-million ringgit on the Malaysia’s Multipurpose Identity Card (MyKad) initiative for the protection of citizens from terrorism as well as for effective and efficient government and private sector applications. If it is not used, the initiative is wasted. For the success of MyKad adoption, both individual and organizations need to accept this initiative. Prior studies ...

متن کامل

Communications of the IBIMA

Malaysia has invested multi-million ringgit on the Malaysia’s Multipurpose Identity Card (MyKad) initiative for the protection of citizens from terrorism as well as for effective and efficient government and private sector applications. If it is not used, the initiative is wasted. For the success of MyKad adoption, both individual and organizations need to accept this initiative. Prior studies ...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003