Who's guarding access to your access control system?

International Security Journal: When it comes to managing access to buildings, rooms and storage areas, the most vulnerable point of attack is not the access control system itself, it's how the cryptographic keys embedded in readers get there to begin with. Find out how LEGIC's Master-Token System-Control solves this problem.

Security is as strong as the weakest link
We all have daily experience with smartcard-based access – most of us use it when entering our workplaces using a badge as a personal credential. The basis of security is the guarantee that no one can gain access to the encryption key (also referred to as “password”) stored in the door lock’s secure memory. For AES encryption, this is simply a 128-, 192-, or 256-bit number. Modern semiconductor technology in the form of a “Secure Element” prohibits physical or electrical access to this encryption key once it is stored in electronic door locks, even by the most sophisticated hacker.

One weakness, however, still exists.

How are encryption keys installed?
When it comes to managing access to buildings, rooms and storage areas, the most vulnerable point of attack is not the access control system itself, encryption used, nor physical media such as employee badges – it’s how the cryptographic keys embedded in door locks get there to begin with. A breach at this most fundamental level of access security can render the entire access control deployment vulnerable. 

Read how LEGIC’s unique “Master-Token System-Control” Key and Authorization Management solution (MTSC) has been designed to provide companies and institutions with absolute independence and control over their organization’s access security including cards and readers.

 

 


Articles & Interviews