Securing NFC with elliptic curve cryptography - Challenges and solutions

被引:0
|
作者
机构
[1] Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON
来源
| 1600年 / IOS Press BV卷 / 11期
关键词
Authentication; Elliptic curve cryptography; Implementation; Key agreement; Near field communication; Security; Standardization;
D O I
10.3233/978-1-61499-328-5-97
中图分类号
学科分类号
摘要
Near Field Communication (NFC) is an emerging short-range wireless communication technology that is at the heart of an expanding spectrum of easy-to-use, intuitive, and contactless applications. Unfortunately, the multiple operating modes and numerous application scenarios have made it particularly challenging for securing NFC based systems. In this paper, we review the potential security threats for NFC and summarize the efforts of standardization bodies and industry using elliptic curve cryptography (ECC) to protect NFC based systems in great detail. We also improve a key agreement and confirmation protocol in the ECMA-386 standard to an authenticated version and propose an entity authentication protocol based on the elliptic curve Diffie-Hellman (ECDH) primitive and the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme. Efficient and secure implemen tations of the ECDH scheme on NFC-enabled devices are discussed and reported. © 2013 The authors and IOS Press. All rights reserved.
引用
收藏
页码:97 / 106
页数:9
相关论文
共 50 条
  • [31] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [32] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [33] A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks
    Louw, J.
    Niezen, G.
    Ramotsoela, T. D.
    Abu-Mahfouz, A. M.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1166 - 1170
  • [34] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [35] Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography
    Sardar, Anususya
    Rao, Subba Y., V
    RukmaRekha, N.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 220 - 226
  • [36] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [37] A novel elliptic curve cryptography-based system for smart grid communication
    Kumar, Ajay
    Abhishek, Kumar
    Shah, Kunjal
    Namasudra, Suyel
    Kadry, Seifedine
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2021, 17 (04) : 321 - 342
  • [38] Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
    Niasar, Mojtaba Bisheh
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 228 - 247
  • [39] Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
    Rathee, Geetanjali
    Saini, Hemraj
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (01) : 42 - 52
  • [40] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180