- Portada
- Volume 85 - Année 2016
- Actes de colloques
- Special edition
- NFC threats and attacks: Applying a low cost algorithm for secure channel using Twofish
Vista(s): 3521 (4 ULiège)
Descargar(s): 270 (1 ULiège)
NFC threats and attacks: Applying a low cost algorithm for secure channel using Twofish
Documento adjunto(s)
Version PDF originaleAbstract
Near Field Communication (NFC) is a new technology which can provide communication between mobile devices in short range. Data would be communicate in three modes: (1) between two mobile systems (MS), (2) MS2 NFC tags (3) reader2MS. One of the must public application in this technology is micropayment system, so by developing NFC technology it would be used in E-commerce and e-everything. In combination of E-Commerce and NFC technology MS would be used as smart card. It is clear that by developing one technology we should consider security and protection system for that. Therefore NFC security and protecting MS from attacks and eavesdropping is so important and critical. In this article at the first we will briefly review about this technology and the architecture, in the next step we will explain about NFC threats therefore we can analyze the attack. After that we will describe some scenarios for protecting against the NFC threats. Then we will explain NFC security standards. In this part we will mention to SSH and SCH, we will show that in secure channel we should use a symmetric algorithm. In this standard AES is has been recommended but we will show that two fish algorithm is more complex than in AES on the other hand we will simulate our proposed approach and we will show that the power consumption and processing time are decreased.