Tuesday, December 8, 2015

Near Field Authentication


Near Field Authentication


  • Introduction
    • Near Field Communication (NFC) system provide smartphones the ability to let two smart phones communicate with each other only when they are within a very small distance, usually a few centimeters. 
    • For example, the Google wallet system uses NFC systems to establish the connection between a user and a checkout machine. 
    • For example, the secure file transfer between two smartphones. It uses NFC systems to first exchange a cryptographic key and then transfer encrypted files over wireless local area network (WLN). 
  • Authenticate whether two smartphones stay closely to each other. 
    • It is natural to use NFC chips, however it is not available on many smart phones. 
    • Another approach proposed by Li et al in ICC 2013.
      • Put two smart phones side by side and let the use slide his finger across the two smartphone screens. 
      • When two smart phones are in near field, their designed system will generate the same cryptographic key for both.
      • The key can be used by another system to carry out confidential communications. 
  • Background
    • The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.
      • Alice and Bob agree to use a modulus p = 23 and base g = 5 
      • They have their own secret integer
      • They send message (g^theirSecret) mod p
      • They descrypt the message (message)^their own secret, the results would be the same. Thus they can established a shared key.
    • Man in the middle attack
      • The attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other

Reference
[1] http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6655633

No comments:

Post a Comment