SlideShare a Scribd company logo
1 of 19
Download to read offline
NFC
NFCIP & NFC-SEC STANDARDS
Content
About NFC
• NFC work principle
• NFC standards
Security
• Threats and Solutions
• NFC –SEC standards
Conclusions
About NFC
WORK PRINCIPLE
NFC
• NFC employs electromagnetic induction between two loop antennas
when NFC devices.
About NFC
NFC STANDARDS
NFC Standards
• NFC approved as an ISO/IEC standard and as an ECMA standard.
• ISO/IEC 18092 / ECMA-340 – NFCIP-1
• ISO/IEC 21481/ECMA-352 – NFCIP-2
• Incorporates a variety of existing standards ( ISO/IEC 14443 )
• NFC Forum defined a common data format (NDEF)
NFCIP-1 ISO/IEC 18092 / ECMA-340
• Defines the communication modes for NFCIP-1 using inductive coupled
devices operating at the centre of 13,56 MHz.
• Defines Active and the Passive communication modes.
• Specifies modulation schemes, codings, transfer speeds, and frame format
of the RF interface.
• Specifies initialisation schemes and conditions required for data collision
control during initialisation.
• Defines transport protocol including protocol activation and data Exchange
methods.
• Transfer speeds are 106 kbit/s, 212 kbit/s and 424 kbit/s, for passive-active
modes.
NFC – ISO/IEC 21481 / ECMA-352 – NFCIP-2
• Specifies the communication mode selection mechanism, designed
not to disturb any outgoing communication at 13,56 MHz.
• Only for devices implementing ECMA-340, ISO/IEC 14443 or ISO/IEC
15693.
• Requires implementations to enter the selected communication
mode as specified in the respective standard.
• Communication mode specifications are outside of this Standard.
NFC Security
THREATS, SOLUTIONS AND STANDARDS
NFC Security- Threats and Solutions
Threats Solutions and recommendations
Eavesdropping Secure channel
Data Corruption Counter attack
Data modification Using 106k Baud Rate, SCH
Data insertion No delay, listening channel, SCH
Man in the middle attack
Active-passive communication, listening the
channel
ECMA-385 NFC-SEC
• Specifies NFC secure channel and shared secret services for NFCIP-1
and PDUs and protocol for those services.
• Shared secret provides a key
for propietary encryption
• Secure cannel encrypts data
ECMA-385 NFC-SEC
• Follows the following OSI model.
ECMA-385 NFC-SEC. Protocol Mechanisms
• Shall establish a shared secret using
ACT_REQ and ACT_RES.
• Shall verify their agreed shared secret
usingVFY_REQ andVFY_RES.
• SCH service shall protect data exchange,
using ENC.
• Shall terminate SSE and SCH usingTMN.
ECMA 386 NFC-SEC Cryptography Standard
• NFC – SEC- 01 provides:
Message contents with concatenation rules for keys and other fields
Key primitives
Random number requirements
Conversion and transformation rules
Cryptographic algorithms and methods
• Enables communication between NFCIP-1 devices which do not share
any keys before communicating each other.
• NFC-SEC-01 vulnerable for MITM attacks
ECMA 386 NFC-SEC Cryptography Standard
using ECDH and AES.
• Specifies the message contents and the cryptographic methods for
PID 01.
• ECDH curve p-192 key exchange – 192 bit
• Key derivation and confirmation – AES 128 bit
• Data encryption – AES 128 bit
• Data integrity – AES 128 bit
Conclusions
POINTS TO TAKE INTO ACCOUNT
Conclusions
• NFC by itself cannot provide protection against eavesdropping or
data modifications.
• The only solution is to establish a secure channel.
• MITM is not a high risk, since NFC short operating distance and RF
characteristics
• Due to the difficult of the MITM attack, a DH protocol can be applied.
• NFC-SEC standard provides the SSE and SCH services for p2p mode.
References
• ECMA 385
http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-385.pdf
• ECMA 386
http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-386.pdf
• ECMA 340
https://www.ecma-international.org/publications/files/ECMA-ST/Ecma-340.pdf
• ECMA 352
https://www.ecma-international.org/publications/files/ECMA-ST/ECMA-352.pdf
• Security in Near Field Communication (NFC)
http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf
Thank you
For your attention

More Related Content

What's hot

Near Field Communiation
Near Field CommuniationNear Field Communiation
Near Field CommuniationSai Charan Gaddam
 
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communicationMADHANRAJXBOX360
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)deepak171991
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication pptPrandeep Shekhawat
 
Near field communication
Near field communicationNear field communication
Near field communicationPRADEEP Cheekatla
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technologyIshtdeep Hora
 
Near field communication
Near field communicationNear field communication
Near field communicationJwal Dakwala
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Pavan Kumar B S
 
NFC의 과거 현재 미래
NFC의 과거 현재 미래NFC의 과거 현재 미래
NFC의 과거 현재 미래재식 전
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirMohammed Mudassir
 

What's hot (20)

Near Field Communiation
Near Field CommuniationNear Field Communiation
Near Field Communiation
 
NFC near feald communication
NFC near feald communicationNFC near feald communication
NFC near feald communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC의 과거 현재 미래
NFC의 과거 현재 미래NFC의 과거 현재 미래
NFC의 과거 현재 미래
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 

Viewers also liked

Trf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonTrf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonHĂ  Thanh
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theoryNguyen Duc Anh
 
Rfidç°Ąĺ ą
Rfidç°Ąĺ ąRfidç°Ąĺ ą
Rfidç°Ąĺ ąBill Chung
 
RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTCPqD
 
Ask Contactless Terminals
Ask Contactless TerminalsAsk Contactless Terminals
Ask Contactless Terminalsclaren65
 
Contactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsContactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsAnshuman Sinha
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationHamed M. Sanogo
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic ConceptsAde Okuboyejo
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...ST_World
 
wireless communication
wireless communicationwireless communication
wireless communicationSakshi Bhargava
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Near Field Communication & Android
Near Field Communication & AndroidNear Field Communication & Android
Near Field Communication & Androidromemore
 

Viewers also liked (16)

Trf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonTrf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparison
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theory
 
Rfidç°Ąĺ ą
Rfidç°Ąĺ ąRfidç°Ąĺ ą
Rfidç°Ąĺ ą
 
Nfc technology
Nfc technologyNfc technology
Nfc technology
 
RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoT
 
Ask Contactless Terminals
Ask Contactless TerminalsAsk Contactless Terminals
Ask Contactless Terminals
 
Contactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsContactless (Proximity) Smartcards
Contactless (Proximity) Smartcards
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
 
Civintec introduction 2015
Civintec introduction 2015Civintec introduction 2015
Civintec introduction 2015
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
 
Nfc
NfcNfc
Nfc
 
wireless communication
wireless communicationwireless communication
wireless communication
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Near Field Communication & Android
Near Field Communication & AndroidNear Field Communication & Android
Near Field Communication & Android
 

Similar to NFC- Standards and Security

2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEEAfaq Siddiqui
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
Wireless Cellular Networks.ppt
Wireless Cellular Networks.pptWireless Cellular Networks.ppt
Wireless Cellular Networks.pptparthi4336
 
power reduction in NFC 1
power reduction in NFC 1power reduction in NFC 1
power reduction in NFC 1yogesh singh
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7suddenven
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxNguyenLe340487
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerkantha123
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03Irsandi Hasan
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Communication using network
Communication using networkCommunication using network
Communication using networkOnline
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
Network Protocol
Network ProtocolNetwork Protocol
Network ProtocolKetan Nayak
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxjithu26327
 

Similar to NFC- Standards and Security (20)

2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
Wireless Cellular Networks.ppt
Wireless Cellular Networks.pptWireless Cellular Networks.ppt
Wireless Cellular Networks.ppt
 
power reduction in NFC 1
power reduction in NFC 1power reduction in NFC 1
power reduction in NFC 1
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
CCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptxCCNA_ITN_Chp3.pptx
CCNA_ITN_Chp3.pptx
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
Design device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontrollerDesign device driver for wireless device using 32 bit microcontroller
Design device driver for wireless device using 32 bit microcontroller
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 03
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 

Recently uploaded

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Recently uploaded (20)

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

NFC- Standards and Security

  • 2. Content About NFC • NFC work principle • NFC standards Security • Threats and Solutions • NFC –SEC standards Conclusions
  • 4. NFC • NFC employs electromagnetic induction between two loop antennas when NFC devices.
  • 6. NFC Standards • NFC approved as an ISO/IEC standard and as an ECMA standard. • ISO/IEC 18092 / ECMA-340 – NFCIP-1 • ISO/IEC 21481/ECMA-352 – NFCIP-2 • Incorporates a variety of existing standards ( ISO/IEC 14443 ) • NFC Forum defined a common data format (NDEF)
  • 7. NFCIP-1 ISO/IEC 18092 / ECMA-340 • Defines the communication modes for NFCIP-1 using inductive coupled devices operating at the centre of 13,56 MHz. • Defines Active and the Passive communication modes. • Specifies modulation schemes, codings, transfer speeds, and frame format of the RF interface. • Specifies initialisation schemes and conditions required for data collision control during initialisation. • Defines transport protocol including protocol activation and data Exchange methods. • Transfer speeds are 106 kbit/s, 212 kbit/s and 424 kbit/s, for passive-active modes.
  • 8. NFC – ISO/IEC 21481 / ECMA-352 – NFCIP-2 • Specifies the communication mode selection mechanism, designed not to disturb any outgoing communication at 13,56 MHz. • Only for devices implementing ECMA-340, ISO/IEC 14443 or ISO/IEC 15693. • Requires implementations to enter the selected communication mode as specified in the respective standard. • Communication mode specifications are outside of this Standard.
  • 10. NFC Security- Threats and Solutions Threats Solutions and recommendations Eavesdropping Secure channel Data Corruption Counter attack Data modification Using 106k Baud Rate, SCH Data insertion No delay, listening channel, SCH Man in the middle attack Active-passive communication, listening the channel
  • 11. ECMA-385 NFC-SEC • Specifies NFC secure channel and shared secret services for NFCIP-1 and PDUs and protocol for those services. • Shared secret provides a key for propietary encryption • Secure cannel encrypts data
  • 12. ECMA-385 NFC-SEC • Follows the following OSI model.
  • 13. ECMA-385 NFC-SEC. Protocol Mechanisms • Shall establish a shared secret using ACT_REQ and ACT_RES. • Shall verify their agreed shared secret usingVFY_REQ andVFY_RES. • SCH service shall protect data exchange, using ENC. • Shall terminate SSE and SCH usingTMN.
  • 14. ECMA 386 NFC-SEC Cryptography Standard • NFC – SEC- 01 provides: Message contents with concatenation rules for keys and other fields Key primitives Random number requirements Conversion and transformation rules Cryptographic algorithms and methods • Enables communication between NFCIP-1 devices which do not share any keys before communicating each other. • NFC-SEC-01 vulnerable for MITM attacks
  • 15. ECMA 386 NFC-SEC Cryptography Standard using ECDH and AES. • Specifies the message contents and the cryptographic methods for PID 01. • ECDH curve p-192 key exchange – 192 bit • Key derivation and confirmation – AES 128 bit • Data encryption – AES 128 bit • Data integrity – AES 128 bit
  • 17. Conclusions • NFC by itself cannot provide protection against eavesdropping or data modifications. • The only solution is to establish a secure channel. • MITM is not a high risk, since NFC short operating distance and RF characteristics • Due to the difficult of the MITM attack, a DH protocol can be applied. • NFC-SEC standard provides the SSE and SCH services for p2p mode.
  • 18. References • ECMA 385 http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-385.pdf • ECMA 386 http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-386.pdf • ECMA 340 https://www.ecma-international.org/publications/files/ECMA-ST/Ecma-340.pdf • ECMA 352 https://www.ecma-international.org/publications/files/ECMA-ST/ECMA-352.pdf • Security in Near Field Communication (NFC) http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf
  • 19. Thank you For your attention