CN104796848B - The method for building up of safe lane in near-field communication NFC point-to-point communications - Google Patents
The method for building up of safe lane in near-field communication NFC point-to-point communications Download PDFInfo
- Publication number
- CN104796848B CN104796848B CN201510168448.9A CN201510168448A CN104796848B CN 104796848 B CN104796848 B CN 104796848B CN 201510168448 A CN201510168448 A CN 201510168448A CN 104796848 B CN104796848 B CN 104796848B
- Authority
- CN
- China
- Prior art keywords
- random
- infrastructure elements
- communication
- nfc
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention proposes a kind of method for building up of safe lane in near-field communication NFC point-to-point communications, including:Communication is established between two NFC devices, both sides exchange random information using diffie Herman algorithm and calculate one for generating the infrastructure elements K of symmetric key, two equipment rooms exchange other random informations and obtain other infrastructure elements, and a symmetric key KEY is calculated with infrastructure elements hashing algorithm SHA2 256 safe to use;With the data transmitted in advanced encryption algorithm AES encryption next communication.The present invention realizes in whole process and safe lane is set up in near-field communication, has ensured the confidentiality of transmission data between NFC device.
Description
Technical field
The present invention relates to one kind when near-field communication NFC P-2-P technologies is used to be communicated, without encryption air passage
The middle method for establishing safe lane.
Background technology
Near-field communication technology NFC is a kind of short-range high frequency wireless communication technology, can be saved numerous during communication between devices
Trivial configuration facilitates the interaction realized between electronic equipment.In NFC communication, communication can be established by touching two NFC devices, but
This communication and unencryption, there is the risk being ravesdropping when using professional equipment.NFC operating modes have snap gauge simulation models, read-write
Pattern and ad hoc mode.Under ad hoc mode two NFC devices can transinformation, and complicated interaction can be designed under this pattern
Agreement establishes encrypted information transfer channel, ensures the secrecy transmission of data between two NFC devices.Use the active of baud rate 106
Pattern can effectively avoid data tampering.
In NFC communication, the role of two NFC devices is divided into initial side and target side.Actively initiate NFC communication in initial side;Mesh
Mark side passively waits for, response communication.
During NFC communication foundation, the identity NFCID3 of two equipment rooms exchange.NFCID3 is used in NFC device
In the number generated at random of activation transport protocol, it is the ID of the NFC device, uniquely identifies a NFC device.
Invention content
Safety letter is established in near-field communication NFC P-2-P technologies is used to be communicated the object of the present invention is to provide one kind
The method in road ensures the secrecy transmission of communication data, prevents the eavesdropping to data and Tampering attack, strengthens the safety of data transmission
Property.In order to achieve the above object, the present invention adopts the following technical scheme that:
The method for building up of safe lane, includes the following steps in a kind of near-field communication NFC point-to-point communications:
(1) communication is established between two NFC devices, one is initial side, and one is target side;
(2) the identity NFCID3 generated at random is sent to initial side by target side;
(3) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements respectively
K, method are as follows:Initial side first sends out random data A, p, the corresponding random data B of target side loopback, both sides respectively herein three
An identical infrastructure elements K is calculated respectively using the graceful algorithm of diffie-hellman on the basis of random data;
(4) one segment information INounce of the initial random generation in side is sent to target side;
(5) for target side after information INounce is received, the random information TNounce that generates is sent to initial side;
(6) using infrastructure elements:Both sides use the random ID of target side mark NFCID3, infrastructure elements K, random respectively
Information INounce, TNounce, according to INounce:NFCID3:K:TNounce is linked in sequence, and uses secure hash algorithm
SHA2-SHA2-256 generates symmetric key KEY, and safe lane establishes completion after obtaining symmetric key KEY, uses advanced encryption algorithm
The data that AES encryption is transmitted in next communicating.
The invention has the advantages that realizing the secrecy transmission of information in NFC device point-to-point communication, transmission ensure that
The safety of data.Even if in the communications random ID mark NFCID3, random information INounce, random information TNounce,
It is all intercepted, but K is that both devices calculate respectively, obtains the graceful algorithm of diffie-hellman used in K in current mathematics standard
With can not quickly be cracked under Computing ability, it is ensured that data encryption safe enough prevents data to be ravesdropping and distort.
Description of the drawings
Fig. 1 is the complete sequence diagram of this method
With reference to Fig. 1, NFC device of the initial side for initial side Initiator identity in NFC communication, target side is NFC communication
The NFC device of middle target side Target identity.
Specific embodiment
The present invention is described in detail with example below in conjunction with the accompanying drawings.
The present invention proposes one kind in near-field communication NFC point-to-point communications, and safety letter is established in without encryption air passage
The method in road.After two NFC devices touch foundation communication, exchange random information according to the graceful algorithm of diffie-hellman and calculate a use
In the infrastructure elements K of generation symmetric key, other random informations are then exchanged as other infrastructure elements, use above basis member
Element is calculated according to secure hash algorithm SHA2-256 for symmetric key KEY.With advanced encryption algorithm AES, using symmetrical close
Key KEY encrypted transmission data.
Illustration method implementation process below in conjunction with the accompanying drawings:
Communication is established in the contact of (1) two NFC device, and the identity NFCID3 generated at random is sent to initially by target side
Side.
(2) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements respectively
K.Random data A, p, the corresponding random data B of target side loopback are sent out by initial side first.
(5) one segment information INounce of the initial random generation in side is sent to target method, apparatus.
(6) for target side after information INounce is received, the random information TNounce that generates is sent to initial side.
(7) using infrastructure elements:Random ID mark NFCID3, K, random information INounce, TNounce, both sides according to
Secure hash algorithm SHA2-256, according to formula KEY=SHA2 (INounce:NFCID3:K:TNounce symmetric key) is generated
KEY.Safe lane establishes completion after obtaining symmetric key KEY, with what is transmitted in advanced encryption algorithm AES encryption next communication
Data.
Claims (1)
1. the method for building up of safe lane, includes the following steps in a kind of near-field communication NFC point-to-point communications:
(1) communication is established between two NFC devices, one is initial side, and one is target side;
(2) the identity NFCID3 generated at random is sent to initial side by target side;
(3) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements K respectively, side
Method is as follows:Initial side first sends out random data A, p, the corresponding random data B of target side loopback, both sides respectively herein three it is random
An identical infrastructure elements K is calculated respectively using the graceful algorithm of diffie-hellman on the basis of data;
(4) one segment information INounce of the initial random generation in side is sent to target side;
(5) for target side after information INounce is received, the random information TNounce that generates is sent to initial side;
(6) using infrastructure elements:Both sides are respectively using the random ID of target side mark NFCID3, infrastructure elements K, random information
INounce, TNounce, according to INounce:NFCID3:K:TNounce is linked in sequence, with secure hash algorithm SHA2-
256 generation symmetric key KEY, safe lane establishes completion after obtaining symmetric key KEY, is connect with advanced encryption algorithm AES encryption
Get off the data transmitted in communication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510168448.9A CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510168448.9A CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104796848A CN104796848A (en) | 2015-07-22 |
CN104796848B true CN104796848B (en) | 2018-07-10 |
Family
ID=53561282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510168448.9A Expired - Fee Related CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104796848B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020100057A1 (en) * | 2018-11-13 | 2020-05-22 | Mariam Ayadi | Electronic device for transmitting the password of a wireless network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
CN101527911A (en) * | 2008-03-03 | 2009-09-09 | 索尼株式会社 | Communication device and communication method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103974246B (en) * | 2013-02-05 | 2017-09-08 | 株式会社理光 | Wireless network region based on NFC technique limits control method and system |
-
2015
- 2015-04-09 CN CN201510168448.9A patent/CN104796848B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
CN101527911A (en) * | 2008-03-03 | 2009-09-09 | 索尼株式会社 | Communication device and communication method |
Non-Patent Citations (2)
Title |
---|
MACH:针对WLAN中WPS认证高速攻击方案;刘安;《计算机应用研究》;20140831;第31卷(第8期);全文 * |
基于近场通信的WiFi传输连接方案;马捷;《计算机工程》;20130630;第39卷(第6期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN104796848A (en) | 2015-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Privacy-preserving authentication and key agreement protocols for D2D group communications | |
US20160080940A1 (en) | Method, Apparatus, and System for Configuring Wireless Device | |
EP2320621B1 (en) | Method for establishing cryptographic communications between a remote device and a medical device and system for carrying out the method | |
CA3011085A1 (en) | System and method for implementing secure communications for internet of things (iot) devices | |
JP2015515154A5 (en) | Network entity, user device, and communication control method | |
CN101908959B (en) | Method, equipment and system thereof for establishing shared key | |
JP2016516330A5 (en) | ||
MX354833B (en) | Data encryption protocols for mobile satellite communications. | |
CN105577680A (en) | Key generation method, encrypted data analyzing method, devices and key managing center | |
RU2015118109A (en) | Wireless communication system | |
KR20120073288A (en) | Method and device for establishing a wireless link key | |
CN107147666A (en) | The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform | |
WO2008103991A3 (en) | Method and apparatus to deploy dynamic credential infrastructure based on proximity | |
CN101707767B (en) | Data transmission method and devices | |
US20140355763A1 (en) | Method and apparatus for generation and distributing a group key in wireless docking | |
CN105577377A (en) | Identity-based authentication method and identity-based authentication system with secret key negotiation | |
CN110022320A (en) | A kind of communication partner method and communication device | |
CN106209360A (en) | A kind of authentication identifying method of wildcard based on the close algorithm of state | |
Park et al. | Symmetric key-based authentication and the session key agreement scheme in IoT environment | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN105187203B (en) | Shared key method for building up based on received signal strength between a kind of wireless device | |
CN104796848B (en) | The method for building up of safe lane in near-field communication NFC point-to-point communications | |
WO2015062314A1 (en) | Method and device for key negotiation processing | |
Diallo et al. | A secure authentication scheme for bluetooth connection | |
CN104902467A (en) | Access method for wireless local area network (WLAN) based on near field communication (NFC) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180710 Termination date: 20210409 |
|
CF01 | Termination of patent right due to non-payment of annual fee |