I. Introduction
The need to secure and protect the IT products and their solutions are increasing rapidly [1]. Security mechanisms are needed to be applied in order to maintain the security characteristics like confidentiality, integrity and availability are intact and data is secured from manipulation and reverse engineering [2]. The first thing that comes to mind when talking about implementing any security mechanism is authentication. By authentication, it means a claimant will need to prove its identity. There are different ways through which a person can be verified, e.g. a password (something known) an identity card, passport, chip (has something) or fingerprint, retina scan, behavior etc. (something a person is).