CN104796848A - Method of establishing safety channels in NFC (near-field communication) point-to-point communication - Google Patents
Method of establishing safety channels in NFC (near-field communication) point-to-point communication Download PDFInfo
- Publication number
- CN104796848A CN104796848A CN201510168448.9A CN201510168448A CN104796848A CN 104796848 A CN104796848 A CN 104796848A CN 201510168448 A CN201510168448 A CN 201510168448A CN 104796848 A CN104796848 A CN 104796848A
- Authority
- CN
- China
- Prior art keywords
- communication
- nfc
- point
- target side
- inounce
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Abstract
The invention provides a method of establishing safety channels in NFC (near-field communication) point-to-point communication. The method includes: establishing communication between two NFC devices, allowing the NFC devices to exchange random information by the Diffie-Hellman algorithm so as to calculate a basic element K used for generating a symmetric key, allowing the NFC devices to exchange other random information to obtain other basic elements, and calculating the basic elements to obtain a symmetric key KEY by a secure hash algorithm SHA2-256; encrypting data transmitted later in communication by the AES (advanced encryption standard) algorithm. The method has the advantages that the safety channels are established in the NFC during the whole process and confidence of the data transmitted among the NFC devices is ensured.
Description
Technical field
The present invention relates to a kind of when using near-field communication NFC P-2-P technology to communicate, in nothing encryption air passage, setting up the method for safe lane.
Background technology
Near-field communication technology NFC is a kind of short-range high frequency wireless communication technology, configuration loaded down with trivial details when can save communication between devices, and what conveniently realize between electronic equipment is mutual.In NFC communication, two NFC device are touched and can set up communication, but this communication unencryption, have when using professional equipment the risk be ravesdropping.NFC mode of operation has snap gauge simulation models, read-write mode and ad hoc mode.Under ad hoc mode, two NFC device can transinformation, and can design complicated interaction protocol under this pattern, sets up the information transfer channel of encryption, ensures the secrecy transmission of data between two NFC device.Use the aggressive mode of baud rate 106 effectively can avoid data tampering.
In NFC communication, the role of two NFC device is divided into initial side and target side.Initial side initiatively initiates NFC communication; The passive wait of target side, responding communication.
In NFC communication process of establishing, the identify label NFCID3 that two equipment rooms exchange.NFCID3 is for activating the number of the stochastic generation of transport protocol in NFC device, is the ID of this NFC device, and unique identifies a NFC device.
Summary of the invention
The object of this invention is to provide a kind of method setting up safe lane in using near-field communication NFC P-2-P technology to communicate, ensure the secrecy transmission of communication data, prevent the eavesdropping to data and Tampering attack, strengthen the fail safe of transfer of data.In order to achieve the above object, the present invention adopts following technical scheme:
In near-field communication NFC point-to-point communication, a method for building up for safe lane, comprises the following steps:
(1) between two NFC device, set up communication, one is initial side, and one is target side;
(2) the identify label NFCID3 of stochastic generation is sent to initial side by target side;
(3) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively, method is as follows: initial side first sends random data A, p, the corresponding random data B of target side loopback, the basis of these three random data of each leisure of both sides uses Di Fei-Herman algorithm to calculate an identical infrastructure elements K respectively;
(4) initial side's stochastic generation one segment information INounce sends to target side;
(5) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side;
(6) infrastructure elements is used: both sides use random ID mark NFCID3, infrastructure elements K, random information INounce, TNounce of target side respectively, be linked in sequence according to INounce:NFCID3:K:TNounce, symmetric key KEY is generated with SHA SHA2-255, after obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.
The invention has the beneficial effects as follows, achieve the secrecy transmission of information in NFC device point-to-point communication, ensure that the fail safe of transmission data.Even if random ID identifies NFCID3, random information INounce, random information TNounce, is all intercepted in the communications, but K is both devices to be calculated respectively, show that Di Fei-Herman algorithm that K uses cannot crack fast under current mathematics standard and Computing ability, data encryption safe enough can be ensured, prevent data to be ravesdropping and distort.
Accompanying drawing explanation
Fig. 1 is the complete sequential chart of this method
With reference to Fig. 1, initial side is the NFC device of initial side Initiator identity in NFC communication, and target side is the NFC device of target side Target identity in NFC communication.
Embodiment
Below in conjunction with accompanying drawing and example, the present invention is described in detail.
The present invention proposes a kind of in near-field communication NFC point-to-point communication, sets up the method for safe lane in nothing encryption air passage.After two NFC device are touched and are set up communication, exchange random information according to Di Fei-Herman algorithm and calculate one for generating the infrastructure elements K of symmetric key, then exchange other random informations as other infrastructure elements, use above infrastructure elements to calculate for symmetric key KEY according to SHA SHA2-256.Use advanced encryption algorithm AES, use symmetric key KEY encrypted transmission data.
Below in conjunction with accompanying drawing illustration method implementation process:
Communication is set up in (1) two NFC device contact, and the identify label NFCID3 of stochastic generation is sent to initial side by target side.
(2) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively.First random data A, p is sent, the corresponding random data B of target side loopback by initial side.
(5) initial side's stochastic generation one segment information INounce sends to target side equipment.
(6) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side.
(7) infrastructure elements is used: random ID mark NFCID3, K, random information INounce, TNounce, both sides, according to SHA SHA2-255, generate symmetric key KEY according to formula KEY=SHA2 (INounce:NFCID3:K:TNounce).After obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.
Claims (1)
1. the method for building up of safe lane in near-field communication NFC point-to-point communication, comprises the following steps:
(1) between two NFC device, set up communication, one is initial side, and one is target side;
(2) the identify label NFCID3 of stochastic generation is sent to initial side by target side;
(3) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively, method is as follows: initial side first sends random data A, p, the corresponding random data B of target side loopback, the basis of these three random data of each leisure of both sides uses Di Fei-Herman algorithm to calculate an identical infrastructure elements K respectively;
(4) initial side's stochastic generation one segment information INounce sends to target side;
(5) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side;
(6) infrastructure elements is used: both sides use random ID mark NFCID3, infrastructure elements K, random information INounce, TNounce of target side respectively, be linked in sequence according to INounce:NFCID3:K:TNounce, symmetric key KEY is generated with SHA SHA2-255, after obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510168448.9A CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510168448.9A CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104796848A true CN104796848A (en) | 2015-07-22 |
CN104796848B CN104796848B (en) | 2018-07-10 |
Family
ID=53561282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510168448.9A Expired - Fee Related CN104796848B (en) | 2015-04-09 | 2015-04-09 | The method for building up of safe lane in near-field communication NFC point-to-point communications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104796848B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020100057A1 (en) * | 2018-11-13 | 2020-05-22 | Mariam Ayadi | Electronic device for transmitting the password of a wireless network |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
CN101527911A (en) * | 2008-03-03 | 2009-09-09 | 索尼株式会社 | Communication device and communication method |
US20140219262A1 (en) * | 2013-02-05 | 2014-08-07 | Ricoh Company, Ltd. | Wireless network area limiting method and system based on near field communication |
-
2015
- 2015-04-09 CN CN201510168448.9A patent/CN104796848B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
CN101527911A (en) * | 2008-03-03 | 2009-09-09 | 索尼株式会社 | Communication device and communication method |
US20140219262A1 (en) * | 2013-02-05 | 2014-08-07 | Ricoh Company, Ltd. | Wireless network area limiting method and system based on near field communication |
Non-Patent Citations (2)
Title |
---|
刘安: "MACH:针对WLAN中WPS认证高速攻击方案", 《计算机应用研究》 * |
马捷: "基于近场通信的WiFi传输连接方案", 《计算机工程》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020100057A1 (en) * | 2018-11-13 | 2020-05-22 | Mariam Ayadi | Electronic device for transmitting the password of a wireless network |
Also Published As
Publication number | Publication date |
---|---|
CN104796848B (en) | 2018-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105684344B (en) | A kind of cipher key configuration method and apparatus | |
JP2014527379A5 (en) | ||
US20160080940A1 (en) | Method, Apparatus, and System for Configuring Wireless Device | |
MX2015016228A (en) | Data encryption protocols for mobile satellite communications. | |
CN103795534A (en) | Password-based authentication method and apparatus executing the method | |
RU2015118109A (en) | Wireless communication system | |
CN108989309B (en) | Encryption communication method and encryption communication device based on narrow-band Internet of things | |
GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
TW201701599A (en) | Wireless communication | |
CN106031120B (en) | Key management | |
JP2015515154A5 (en) | Network entity, user device, and communication control method | |
CN107147666A (en) | The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform | |
CN103457724B (en) | Method and system for point-to-point data safe transmission | |
KR101865452B1 (en) | An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks | |
CN105577625A (en) | Entity discriminating method and device based on pre-shared key (PSK) | |
Park et al. | Symmetric key-based authentication and the session key agreement scheme in IoT environment | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
JP2017517915A (en) | Entity authentication method and apparatus | |
CN103916851B (en) | A kind of method of safety certification, equipment and system | |
CN105187203A (en) | Shared secret key establishment method between wireless equipment based on receiving signal intensity | |
CN102355662A (en) | Key exchanging method on basis of wireless low-cost equipment | |
CN103825725B (en) | A kind of efficient random physical layer key generation method based on vector quantization | |
CN104796848A (en) | Method of establishing safety channels in NFC (near-field communication) point-to-point communication | |
CN109246581A (en) | A kind of method and apparatus of communication | |
CN104902467A (en) | Access method for wireless local area network (WLAN) based on near field communication (NFC) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180710 Termination date: 20210409 |
|
CF01 | Termination of patent right due to non-payment of annual fee |