depuis le 05 février 2011 :
Visualisation(s): 3543 (4 ULiège)
Téléchargement(s): 270 (1 ULiège)
print        
Mahmood Fathy & Seyed Ali Samouti

NFC threats and attacks: Applying a low cost algorithm for secure channel using Twofish

(Volume 85 - Année 2016 — Actes de colloques — Special edition)
Article
Open Access

Document(s) associé(s)

Version PDF originale

Abstract

Near Field Communication (NFC) is a new technology which can provide communication between mobile devices in short range. Data would be communicate in three modes: (1) between two mobile systems (MS), (2) MS2 NFC tags (3) reader2MS. One of the must public application in this technology is micropayment system, so by developing NFC technology it would be used in E-commerce and e-everything. In combination of E-Commerce and NFC technology MS would be used as smart card. It is clear that by developing one technology we should consider security and protection system for that. Therefore NFC security and protecting MS from attacks and eavesdropping is so important and critical. In this article at the first we will briefly review about this technology and the architecture, in the next step we will explain about NFC threats therefore we can analyze the attack. After that we will describe some scenarios for protecting against the NFC threats. Then we will explain NFC security standards. In this part we will mention to SSH and SCH, we will show that in secure channel we should use a symmetric algorithm. In this standard AES is has been recommended but we will show that two fish algorithm is more complex than in AES on the other hand we will simulate our proposed approach and we will show that the power consumption and processing time are decreased.

Keywords : CPU conception, NFC, power conception, twofish

Pour citer cet article

Mahmood Fathy & Seyed Ali Samouti, «NFC threats and attacks: Applying a low cost algorithm for secure channel using Twofish», Bulletin de la Société Royale des Sciences de Liège [En ligne], Volume 85 - Année 2016, Actes de colloques, Special edition, 1475 - 1486 URL : http://popups.ulg.be/0037-9565/index.php?id=6187.

A propos de : Mahmood Fathy

Professor Iran university of science and technology, Tehran, Iran, mahfathi@iust.ac.ir

A propos de : Seyed Ali Samouti

Senior IT expert, Iran university of science and technology, Tehran, Iran, Ali.samouti@gmail.com