You are on page 1of 1

1.

0 Introduction
The system’s architectural and functional designs have been more complex and in
many cases vulnerable in respect to its security attributes. This is because of the
increasing need for decentralized information systems offering data to people who
need them irrespective of their physical location. Another reason is because of the
requirement for exchanging information between different but interoperable systems.
The concept of a “secure portable information file”, that can nowadays be easily
implemented through the available smart card technology and can significantly ease
information management and ensure maximum data protection in respect to their
integrity, confidentiality and availability.
The immense advances in the area of information technology and more specifically in
the fabrication of integrated circuits, combined with progress in standardization (Bull,
1996) and a number of external factors such as growing level of fraud in related fields
have lead to the design and manufacturing of smart cards that feature processing
capabilities through an embedded microprocessor application reusable memory and
variety of security features through the execution of cryptographic algorithms.
This report presents the use of smart cards focusing on the utilization of the smart
card’s cryptographic functions for implementing mechanisms capable of providing
extremely secure card’s cryptographic functions for implementing mechanisms
capable of providing an extremely secure operational framework in terms of user and
application provider authencity, management of access privileges and data integrity
and confidentiality.
Harshil Kotecha

You might also like