CN104796848A - Method of establishing safety channels in NFC (near-field communication) point-to-point communication - Google Patents

Method of establishing safety channels in NFC (near-field communication) point-to-point communication Download PDF

Info

Publication number
CN104796848A
CN104796848A CN201510168448.9A CN201510168448A CN104796848A CN 104796848 A CN104796848 A CN 104796848A CN 201510168448 A CN201510168448 A CN 201510168448A CN 104796848 A CN104796848 A CN 104796848A
Authority
CN
China
Prior art keywords
communication
nfc
point
target side
inounce
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510168448.9A
Other languages
Chinese (zh)
Other versions
CN104796848B (en
Inventor
解冰珊
金志刚
李云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201510168448.9A priority Critical patent/CN104796848B/en
Publication of CN104796848A publication Critical patent/CN104796848A/en
Application granted granted Critical
Publication of CN104796848B publication Critical patent/CN104796848B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The invention provides a method of establishing safety channels in NFC (near-field communication) point-to-point communication. The method includes: establishing communication between two NFC devices, allowing the NFC devices to exchange random information by the Diffie-Hellman algorithm so as to calculate a basic element K used for generating a symmetric key, allowing the NFC devices to exchange other random information to obtain other basic elements, and calculating the basic elements to obtain a symmetric key KEY by a secure hash algorithm SHA2-256; encrypting data transmitted later in communication by the AES (advanced encryption standard) algorithm. The method has the advantages that the safety channels are established in the NFC during the whole process and confidence of the data transmitted among the NFC devices is ensured.

Description

The method for building up of safe lane in near-field communication NFC point-to-point communication
Technical field
The present invention relates to a kind of when using near-field communication NFC P-2-P technology to communicate, in nothing encryption air passage, setting up the method for safe lane.
Background technology
Near-field communication technology NFC is a kind of short-range high frequency wireless communication technology, configuration loaded down with trivial details when can save communication between devices, and what conveniently realize between electronic equipment is mutual.In NFC communication, two NFC device are touched and can set up communication, but this communication unencryption, have when using professional equipment the risk be ravesdropping.NFC mode of operation has snap gauge simulation models, read-write mode and ad hoc mode.Under ad hoc mode, two NFC device can transinformation, and can design complicated interaction protocol under this pattern, sets up the information transfer channel of encryption, ensures the secrecy transmission of data between two NFC device.Use the aggressive mode of baud rate 106 effectively can avoid data tampering.
In NFC communication, the role of two NFC device is divided into initial side and target side.Initial side initiatively initiates NFC communication; The passive wait of target side, responding communication.
In NFC communication process of establishing, the identify label NFCID3 that two equipment rooms exchange.NFCID3 is for activating the number of the stochastic generation of transport protocol in NFC device, is the ID of this NFC device, and unique identifies a NFC device.
Summary of the invention
The object of this invention is to provide a kind of method setting up safe lane in using near-field communication NFC P-2-P technology to communicate, ensure the secrecy transmission of communication data, prevent the eavesdropping to data and Tampering attack, strengthen the fail safe of transfer of data.In order to achieve the above object, the present invention adopts following technical scheme:
In near-field communication NFC point-to-point communication, a method for building up for safe lane, comprises the following steps:
(1) between two NFC device, set up communication, one is initial side, and one is target side;
(2) the identify label NFCID3 of stochastic generation is sent to initial side by target side;
(3) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively, method is as follows: initial side first sends random data A, p, the corresponding random data B of target side loopback, the basis of these three random data of each leisure of both sides uses Di Fei-Herman algorithm to calculate an identical infrastructure elements K respectively;
(4) initial side's stochastic generation one segment information INounce sends to target side;
(5) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side;
(6) infrastructure elements is used: both sides use random ID mark NFCID3, infrastructure elements K, random information INounce, TNounce of target side respectively, be linked in sequence according to INounce:NFCID3:K:TNounce, symmetric key KEY is generated with SHA SHA2-255, after obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.
The invention has the beneficial effects as follows, achieve the secrecy transmission of information in NFC device point-to-point communication, ensure that the fail safe of transmission data.Even if random ID identifies NFCID3, random information INounce, random information TNounce, is all intercepted in the communications, but K is both devices to be calculated respectively, show that Di Fei-Herman algorithm that K uses cannot crack fast under current mathematics standard and Computing ability, data encryption safe enough can be ensured, prevent data to be ravesdropping and distort.
Accompanying drawing explanation
Fig. 1 is the complete sequential chart of this method
With reference to Fig. 1, initial side is the NFC device of initial side Initiator identity in NFC communication, and target side is the NFC device of target side Target identity in NFC communication.
Embodiment
Below in conjunction with accompanying drawing and example, the present invention is described in detail.
The present invention proposes a kind of in near-field communication NFC point-to-point communication, sets up the method for safe lane in nothing encryption air passage.After two NFC device are touched and are set up communication, exchange random information according to Di Fei-Herman algorithm and calculate one for generating the infrastructure elements K of symmetric key, then exchange other random informations as other infrastructure elements, use above infrastructure elements to calculate for symmetric key KEY according to SHA SHA2-256.Use advanced encryption algorithm AES, use symmetric key KEY encrypted transmission data.
Below in conjunction with accompanying drawing illustration method implementation process:
Communication is set up in (1) two NFC device contact, and the identify label NFCID3 of stochastic generation is sent to initial side by target side.
(2) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively.First random data A, p is sent, the corresponding random data B of target side loopback by initial side.
(5) initial side's stochastic generation one segment information INounce sends to target side equipment.
(6) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side.
(7) infrastructure elements is used: random ID mark NFCID3, K, random information INounce, TNounce, both sides, according to SHA SHA2-255, generate symmetric key KEY according to formula KEY=SHA2 (INounce:NFCID3:K:TNounce).After obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.

Claims (1)

1. the method for building up of safe lane in near-field communication NFC point-to-point communication, comprises the following steps:
(1) between two NFC device, set up communication, one is initial side, and one is target side;
(2) the identify label NFCID3 of stochastic generation is sent to initial side by target side;
(3) both sides use Di Fei-Herman algorithm exchange random data also to calculate an identical infrastructure elements K respectively, method is as follows: initial side first sends random data A, p, the corresponding random data B of target side loopback, the basis of these three random data of each leisure of both sides uses Di Fei-Herman algorithm to calculate an identical infrastructure elements K respectively;
(4) initial side's stochastic generation one segment information INounce sends to target side;
(5) target side is after receiving information INounce, and stochastic generation information TNounce sends to initial side;
(6) infrastructure elements is used: both sides use random ID mark NFCID3, infrastructure elements K, random information INounce, TNounce of target side respectively, be linked in sequence according to INounce:NFCID3:K:TNounce, symmetric key KEY is generated with SHA SHA2-255, after obtaining symmetric key KEY, safe lane has been set up, the data of transmission in next communicating by advanced encryption algorithm AES encryption.
CN201510168448.9A 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications Expired - Fee Related CN104796848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510168448.9A CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510168448.9A CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Publications (2)

Publication Number Publication Date
CN104796848A true CN104796848A (en) 2015-07-22
CN104796848B CN104796848B (en) 2018-07-10

Family

ID=53561282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510168448.9A Expired - Fee Related CN104796848B (en) 2015-04-09 2015-04-09 The method for building up of safe lane in near-field communication NFC point-to-point communications

Country Status (1)

Country Link
CN (1) CN104796848B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020100057A1 (en) * 2018-11-13 2020-05-22 Mariam Ayadi Electronic device for transmitting the password of a wireless network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
CN101527911A (en) * 2008-03-03 2009-09-09 索尼株式会社 Communication device and communication method
US20140219262A1 (en) * 2013-02-05 2014-08-07 Ricoh Company, Ltd. Wireless network area limiting method and system based on near field communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
CN101527911A (en) * 2008-03-03 2009-09-09 索尼株式会社 Communication device and communication method
US20140219262A1 (en) * 2013-02-05 2014-08-07 Ricoh Company, Ltd. Wireless network area limiting method and system based on near field communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘安: "MACH:针对WLAN中WPS认证高速攻击方案", 《计算机应用研究》 *
马捷: "基于近场通信的WiFi传输连接方案", 《计算机工程》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020100057A1 (en) * 2018-11-13 2020-05-22 Mariam Ayadi Electronic device for transmitting the password of a wireless network

Also Published As

Publication number Publication date
CN104796848B (en) 2018-07-10

Similar Documents

Publication Publication Date Title
CN105684344B (en) A kind of cipher key configuration method and apparatus
JP2014527379A5 (en)
US20160080940A1 (en) Method, Apparatus, and System for Configuring Wireless Device
MX2015016228A (en) Data encryption protocols for mobile satellite communications.
CN103795534A (en) Password-based authentication method and apparatus executing the method
RU2015118109A (en) Wireless communication system
CN108989309B (en) Encryption communication method and encryption communication device based on narrow-band Internet of things
GB2528226A (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end
TW201701599A (en) Wireless communication
CN106031120B (en) Key management
JP2015515154A5 (en) Network entity, user device, and communication control method
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
CN103457724B (en) Method and system for point-to-point data safe transmission
KR101865452B1 (en) An Evaluation System of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks
CN105577625A (en) Entity discriminating method and device based on pre-shared key (PSK)
Park et al. Symmetric key-based authentication and the session key agreement scheme in IoT environment
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
JP2017517915A (en) Entity authentication method and apparatus
CN103916851B (en) A kind of method of safety certification, equipment and system
CN105187203A (en) Shared secret key establishment method between wireless equipment based on receiving signal intensity
CN102355662A (en) Key exchanging method on basis of wireless low-cost equipment
CN103825725B (en) A kind of efficient random physical layer key generation method based on vector quantization
CN104796848A (en) Method of establishing safety channels in NFC (near-field communication) point-to-point communication
CN109246581A (en) A kind of method and apparatus of communication
CN104902467A (en) Access method for wireless local area network (WLAN) based on near field communication (NFC)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180710

Termination date: 20210409

CF01 Termination of patent right due to non-payment of annual fee