Securing NFC with elliptic curve cryptography - Challenges and solutions

被引:0
|
作者
机构
[1] Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON
来源
| 1600年 / IOS Press BV卷 / 11期
关键词
Authentication; Elliptic curve cryptography; Implementation; Key agreement; Near field communication; Security; Standardization;
D O I
10.3233/978-1-61499-328-5-97
中图分类号
学科分类号
摘要
Near Field Communication (NFC) is an emerging short-range wireless communication technology that is at the heart of an expanding spectrum of easy-to-use, intuitive, and contactless applications. Unfortunately, the multiple operating modes and numerous application scenarios have made it particularly challenging for securing NFC based systems. In this paper, we review the potential security threats for NFC and summarize the efforts of standardization bodies and industry using elliptic curve cryptography (ECC) to protect NFC based systems in great detail. We also improve a key agreement and confirmation protocol in the ECMA-386 standard to an authenticated version and propose an entity authentication protocol based on the elliptic curve Diffie-Hellman (ECDH) primitive and the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme. Efficient and secure implemen tations of the ECDH scheme on NFC-enabled devices are discussed and reported. © 2013 The authors and IOS Press. All rights reserved.
引用
收藏
页码:97 / 106
页数:9
相关论文
共 50 条
  • [41] DES Algorithm Security Fortification Using Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwa
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
  • [42] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [43] A Theoretical Study of Elliptic Curve Cryptography for Location Based Services
    Prasanna, Yeluri Lakshmi
    Reddy, E. Madhusudhana
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 404 - 407
  • [44] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) : 521 - 530
  • [45] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [46] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [47] Securing utility computing using enhanced elliptic curve cryptography and attribute-based access control policy
    Varghese, Saira
    Vigila, S. Maria Celestin
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2022, 13 (04) : 394 - 405
  • [48] A Study of Elliptic Curve Cryptography and Its Applications
    Nikhil, U. Vijay
    Stamenkovic, Z.
    Raja, S. P.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2024,
  • [49] Versatile Hardware Framework for Elliptic Curve Cryptography
    Masek, Vit
    Novotny, Martin
    2022 25TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS (DDECS), 2022, : 80 - 83
  • [50] Asymmetric multiple image elliptic curve cryptography
    Li, Wei
    Chang, Xiangyu
    Yan, Aimin
    Zhang, Hongbo
    OPTICS AND LASERS IN ENGINEERING, 2021, 136