Securing NFC with elliptic curve cryptography - Challenges and solutions

被引:0
|
作者
机构
[1] Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON
来源
| 1600年 / IOS Press BV卷 / 11期
关键词
Authentication; Elliptic curve cryptography; Implementation; Key agreement; Near field communication; Security; Standardization;
D O I
10.3233/978-1-61499-328-5-97
中图分类号
学科分类号
摘要
Near Field Communication (NFC) is an emerging short-range wireless communication technology that is at the heart of an expanding spectrum of easy-to-use, intuitive, and contactless applications. Unfortunately, the multiple operating modes and numerous application scenarios have made it particularly challenging for securing NFC based systems. In this paper, we review the potential security threats for NFC and summarize the efforts of standardization bodies and industry using elliptic curve cryptography (ECC) to protect NFC based systems in great detail. We also improve a key agreement and confirmation protocol in the ECMA-386 standard to an authenticated version and propose an entity authentication protocol based on the elliptic curve Diffie-Hellman (ECDH) primitive and the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme. Efficient and secure implemen tations of the ECDH scheme on NFC-enabled devices are discussed and reported. © 2013 The authors and IOS Press. All rights reserved.
引用
收藏
页码:97 / 106
页数:9
相关论文
共 50 条
  • [21] Elliptic Curve Cryptography in Java']Java
    Deligiannidis, Leonidas
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 193 - 193
  • [22] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [23] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [24] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [25] Error analysis and detection procedures for elliptic curve cryptography
    Saudy, Naglaa F.
    Ali, Ihab A.
    Al Barkouky, Reda
    AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (03) : 587 - 597
  • [26] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [27] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [28] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [29] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [30] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055