CN104796848B - The method for building up of safe lane in near-field communication NFC point-to-point communications - Google Patents

The method for building up of safe lane in near-field communication NFC point-to-point communications Download PDF

Info

Publication number
CN104796848B
CN104796848B CN201510168448.9A CN201510168448A CN104796848B CN 104796848 B CN104796848 B CN 104796848B CN 201510168448 A CN201510168448 A CN 201510168448A CN 104796848 B CN104796848 B CN 104796848B
Authority
CN
China
Prior art keywords
random
infrastructure elements
communication
nfc
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510168448.9A
Other languages
Chinese (zh)
Other versions
CN104796848A (en
Inventor
解冰珊
金志刚
李云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201510168448.9A priority Critical patent/CN104796848B/en
Publication of CN104796848A publication Critical patent/CN104796848A/en
Application granted granted Critical
Publication of CN104796848B publication Critical patent/CN104796848B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention proposes a kind of method for building up of safe lane in near-field communication NFC point-to-point communications, including:Communication is established between two NFC devices, both sides exchange random information using diffie Herman algorithm and calculate one for generating the infrastructure elements K of symmetric key, two equipment rooms exchange other random informations and obtain other infrastructure elements, and a symmetric key KEY is calculated with infrastructure elements hashing algorithm SHA2 256 safe to use;With the data transmitted in advanced encryption algorithm AES encryption next communication.The present invention realizes in whole process and safe lane is set up in near-field communication, has ensured the confidentiality of transmission data between NFC device.

Description

The method for building up of safe lane in near-field communication NFC point-to-point communications
Technical field
The present invention relates to one kind when near-field communication NFC P-2-P technologies is used to be communicated, without encryption air passage The middle method for establishing safe lane.
Background technology
Near-field communication technology NFC is a kind of short-range high frequency wireless communication technology, can be saved numerous during communication between devices Trivial configuration facilitates the interaction realized between electronic equipment.In NFC communication, communication can be established by touching two NFC devices, but This communication and unencryption, there is the risk being ravesdropping when using professional equipment.NFC operating modes have snap gauge simulation models, read-write Pattern and ad hoc mode.Under ad hoc mode two NFC devices can transinformation, and complicated interaction can be designed under this pattern Agreement establishes encrypted information transfer channel, ensures the secrecy transmission of data between two NFC devices.Use the active of baud rate 106 Pattern can effectively avoid data tampering.
In NFC communication, the role of two NFC devices is divided into initial side and target side.Actively initiate NFC communication in initial side;Mesh Mark side passively waits for, response communication.
During NFC communication foundation, the identity NFCID3 of two equipment rooms exchange.NFCID3 is used in NFC device In the number generated at random of activation transport protocol, it is the ID of the NFC device, uniquely identifies a NFC device.
Invention content
Safety letter is established in near-field communication NFC P-2-P technologies is used to be communicated the object of the present invention is to provide one kind The method in road ensures the secrecy transmission of communication data, prevents the eavesdropping to data and Tampering attack, strengthens the safety of data transmission Property.In order to achieve the above object, the present invention adopts the following technical scheme that:
The method for building up of safe lane, includes the following steps in a kind of near-field communication NFC point-to-point communications:
(1) communication is established between two NFC devices, one is initial side, and one is target side;
(2) the identity NFCID3 generated at random is sent to initial side by target side;
(3) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements respectively K, method are as follows:Initial side first sends out random data A, p, the corresponding random data B of target side loopback, both sides respectively herein three An identical infrastructure elements K is calculated respectively using the graceful algorithm of diffie-hellman on the basis of random data;
(4) one segment information INounce of the initial random generation in side is sent to target side;
(5) for target side after information INounce is received, the random information TNounce that generates is sent to initial side;
(6) using infrastructure elements:Both sides use the random ID of target side mark NFCID3, infrastructure elements K, random respectively Information INounce, TNounce, according to INounce:NFCID3:K:TNounce is linked in sequence, and uses secure hash algorithm SHA2-SHA2-256 generates symmetric key KEY, and safe lane establishes completion after obtaining symmetric key KEY, uses advanced encryption algorithm The data that AES encryption is transmitted in next communicating.
The invention has the advantages that realizing the secrecy transmission of information in NFC device point-to-point communication, transmission ensure that The safety of data.Even if in the communications random ID mark NFCID3, random information INounce, random information TNounce, It is all intercepted, but K is that both devices calculate respectively, obtains the graceful algorithm of diffie-hellman used in K in current mathematics standard With can not quickly be cracked under Computing ability, it is ensured that data encryption safe enough prevents data to be ravesdropping and distort.
Description of the drawings
Fig. 1 is the complete sequence diagram of this method
With reference to Fig. 1, NFC device of the initial side for initial side Initiator identity in NFC communication, target side is NFC communication The NFC device of middle target side Target identity.
Specific embodiment
The present invention is described in detail with example below in conjunction with the accompanying drawings.
The present invention proposes one kind in near-field communication NFC point-to-point communications, and safety letter is established in without encryption air passage The method in road.After two NFC devices touch foundation communication, exchange random information according to the graceful algorithm of diffie-hellman and calculate a use In the infrastructure elements K of generation symmetric key, other random informations are then exchanged as other infrastructure elements, use above basis member Element is calculated according to secure hash algorithm SHA2-256 for symmetric key KEY.With advanced encryption algorithm AES, using symmetrical close Key KEY encrypted transmission data.
Illustration method implementation process below in conjunction with the accompanying drawings:
Communication is established in the contact of (1) two NFC device, and the identity NFCID3 generated at random is sent to initially by target side Side.
(2) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements respectively K.Random data A, p, the corresponding random data B of target side loopback are sent out by initial side first.
(5) one segment information INounce of the initial random generation in side is sent to target method, apparatus.
(6) for target side after information INounce is received, the random information TNounce that generates is sent to initial side.
(7) using infrastructure elements:Random ID mark NFCID3, K, random information INounce, TNounce, both sides according to Secure hash algorithm SHA2-256, according to formula KEY=SHA2 (INounce:NFCID3:K:TNounce symmetric key) is generated KEY.Safe lane establishes completion after obtaining symmetric key KEY, with what is transmitted in advanced encryption algorithm AES encryption next communication Data.

Claims (1)

1. the method for building up of safe lane, includes the following steps in a kind of near-field communication NFC point-to-point communications:
(1) communication is established between two NFC devices, one is initial side, and one is target side;
(2) the identity NFCID3 generated at random is sent to initial side by target side;
(3) both sides exchange random data using the graceful algorithm of diffie-hellman and calculate an identical infrastructure elements K respectively, side Method is as follows:Initial side first sends out random data A, p, the corresponding random data B of target side loopback, both sides respectively herein three it is random An identical infrastructure elements K is calculated respectively using the graceful algorithm of diffie-hellman on the basis of data;
(4) one segment information INounce of the initial random generation in side is sent to target side;
(5) for target side after information INounce is received, the random information TNounce that generates is sent to initial side;
(6) using infrastructure elements:Both sides are respectively using the random ID of target side mark NFCID3, infrastructure elements K, random information INounce, TNounce, according to INounce:NFCID3:K:TNounce is linked in sequence, with secure hash algorithm SHA2- 256 generation symmetric key KEY, safe lane establishes completion after obtaining symmetric key KEY, is connect with advanced encryption algorithm AES encryption Get off the data transmitted in communication.
CN201510168448.9A 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications Expired - Fee Related CN104796848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510168448.9A CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510168448.9A CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Publications (2)

Publication Number Publication Date
CN104796848A CN104796848A (en) 2015-07-22
CN104796848B true CN104796848B (en) 2018-07-10

Family

ID=53561282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510168448.9A Expired - Fee Related CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Country Status (1)

Country Link
CN (1) CN104796848B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020100057A1 (en) * 2018-11-13 2020-05-22 Mariam Ayadi Electronic device for transmitting the password of a wireless network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
CN101527911A (en) * 2008-03-03 2009-09-09 索尼株式会社 Communication device and communication method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974246B (en) * 2013-02-05 2017-09-08 株式会社理光 Wireless network region based on NFC technique limits control method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
CN101527911A (en) * 2008-03-03 2009-09-09 索尼株式会社 Communication device and communication method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MACH:针对WLAN中WPS认证高速攻击方案;刘安;《计算机应用研究》;20140831;第31卷(第8期);全文 *
基于近场通信的WiFi传输连接方案;马捷;《计算机工程》;20130630;第39卷(第6期);全文 *

Also Published As

Publication number Publication date
CN104796848A (en) 2015-07-22

Similar Documents

Publication Publication Date Title
Wang et al. Privacy-preserving authentication and key agreement protocols for D2D group communications
US20160080940A1 (en) Method, Apparatus, and System for Configuring Wireless Device
EP2320621B1 (en) Method for establishing cryptographic communications between a remote device and a medical device and system for carrying out the method
CA3011085A1 (en) System and method for implementing secure communications for internet of things (iot) devices
JP2015515154A5 (en) Network entity, user device, and communication control method
CN101908959B (en) Method, equipment and system thereof for establishing shared key
JP2016516330A5 (en)
MX354833B (en) Data encryption protocols for mobile satellite communications.
CN105577680A (en) Key generation method, encrypted data analyzing method, devices and key managing center
RU2015118109A (en) Wireless communication system
KR20120073288A (en) Method and device for establishing a wireless link key
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
WO2008103991A3 (en) Method and apparatus to deploy dynamic credential infrastructure based on proximity
CN101707767B (en) Data transmission method and devices
US20140355763A1 (en) Method and apparatus for generation and distributing a group key in wireless docking
CN105577377A (en) Identity-based authentication method and identity-based authentication system with secret key negotiation
CN110022320A (en) A kind of communication partner method and communication device
CN106209360A (en) A kind of authentication identifying method of wildcard based on the close algorithm of state
Park et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN105187203B (en) Shared key method for building up based on received signal strength between a kind of wireless device
CN104796848B (en) The method for building up of safe lane in near-field communication NFC point-to-point communications
WO2015062314A1 (en) Method and device for key negotiation processing
Diallo et al. A secure authentication scheme for bluetooth connection
CN104902467A (en) Access method for wireless local area network (WLAN) based on near field communication (NFC)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180710

Termination date: 20210409

CF01 Termination of patent right due to non-payment of annual fee