Securing NFC with elliptic curve cryptography - Challenges and solutions

被引:0
|
作者
机构
[1] Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON
来源
| 1600年 / IOS Press BV卷 / 11期
关键词
Authentication; Elliptic curve cryptography; Implementation; Key agreement; Near field communication; Security; Standardization;
D O I
10.3233/978-1-61499-328-5-97
中图分类号
学科分类号
摘要
Near Field Communication (NFC) is an emerging short-range wireless communication technology that is at the heart of an expanding spectrum of easy-to-use, intuitive, and contactless applications. Unfortunately, the multiple operating modes and numerous application scenarios have made it particularly challenging for securing NFC based systems. In this paper, we review the potential security threats for NFC and summarize the efforts of standardization bodies and industry using elliptic curve cryptography (ECC) to protect NFC based systems in great detail. We also improve a key agreement and confirmation protocol in the ECMA-386 standard to an authenticated version and propose an entity authentication protocol based on the elliptic curve Diffie-Hellman (ECDH) primitive and the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme. Efficient and secure implemen tations of the ECDH scheme on NFC-enabled devices are discussed and reported. © 2013 The authors and IOS Press. All rights reserved.
引用
收藏
页码:97 / 106
页数:9
相关论文
共 50 条
  • [1] Securing XML Web Services with Elliptic Curve Cryptography
    Liu, Ying
    Yeap, Tet H.
    O'Brien, William
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 974 - 977
  • [2] Securing Resource Constraints Embedded Devices Using Elliptic Curve Cryptography
    Tam, Tony
    Alfasi, Mohamed
    Mozumdar, Mohammad
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII, 2014, 9085
  • [3] Securing AOMDV Protocol in Mobile Adhoc Network with Elliptic Curve Cryptography
    Sultana, Jeenat
    Ahmed, Tasnuva
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 539 - 543
  • [4] Elliptic Curve Cryptography: Current Status and Research Challenges
    Kalra, Sheetal
    Sood, Sandeep K.
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 455 - +
  • [5] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [6] Securing Data Using Elliptic Curve Cryptography and Least Significant Bit Steganography
    Bhadra, Jayati
    Banga, M. K.
    Murthy, M. Vinayaka
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1460 - 1466
  • [7] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [8] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [9] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [10] A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server
    Ahangari, Farnad
    Moghaddam, Mahsa Hosseinpour
    Seno, Seyyed Amin Hosseini
    SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 447 - 454