Securing NFC with elliptic curve cryptography - Challenges and solutions

被引:0
|
作者
机构
[1] Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON
来源
| 1600年 / IOS Press BV卷 / 11期
关键词
Authentication; Elliptic curve cryptography; Implementation; Key agreement; Near field communication; Security; Standardization;
D O I
10.3233/978-1-61499-328-5-97
中图分类号
学科分类号
摘要
Near Field Communication (NFC) is an emerging short-range wireless communication technology that is at the heart of an expanding spectrum of easy-to-use, intuitive, and contactless applications. Unfortunately, the multiple operating modes and numerous application scenarios have made it particularly challenging for securing NFC based systems. In this paper, we review the potential security threats for NFC and summarize the efforts of standardization bodies and industry using elliptic curve cryptography (ECC) to protect NFC based systems in great detail. We also improve a key agreement and confirmation protocol in the ECMA-386 standard to an authenticated version and propose an entity authentication protocol based on the elliptic curve Diffie-Hellman (ECDH) primitive and the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme. Efficient and secure implemen tations of the ECDH scheme on NFC-enabled devices are discussed and reported. © 2013 The authors and IOS Press. All rights reserved.
引用
收藏
页码:97 / 106
页数:9
相关论文
共 50 条
  • [11] An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Kumari, Saru
    Li, Xiong
    Sangaiah, Arun Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 : 557 - 565
  • [12] An Elliptic Curve Cryptography based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks
    Chhabra, Anshuman
    Arora, Shivam
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 243 - 246
  • [13] A Framework for Securing Data by using Elliptic Curve Cryptography and Reed Solomon Coding Schemes
    Amankona, Vincent
    Twum, Frimpong
    Ben Hayfron-Acquah, James
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1441 - 1446
  • [14] Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
    Ullah, Shamsher
    Jiangbin, Zheng
    Din, Nizamud
    Hussain, Muhammad Tanveer
    Ullah, Farhan
    Yousaf, Mahwish
    COMPUTER SCIENCE REVIEW, 2023, 47
  • [15] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415
  • [16] Elliptic Curve Cryptography for Security in Connected Vehicles
    Genc, Yasin
    Habek, Muhammed
    Aytas, Nilay
    Akkoc, Ahmet
    Afacan, Erkan
    Yazgan, Erdem
    2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2022,
  • [17] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [18] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407
  • [19] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06) : 1793 - 1807
  • [20] Efficient Architectures for Elliptic Curve Cryptography Processors for RFID
    Leinweber, Lawrence
    Papachristou, Christos
    Wolff, Francis G.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2009, : 372 - 377