SlideShare a Scribd company logo
1 of 47
Download to read offline
Near Field Communication
It's got the potential to change how we pay for things
and even open doors (and all by using our
smartphones), but what is NFC and how does it work?
Mobile has emerged from a device that was used for mere calling other people
to a device that includes powerful apps that have capabilities for almost anything one
can imagine of :
Multimedia
High definition graphics (Tegra 3 )
Database management
Artificial Intelligence (SIRI)
Cloud Printing (Cloud Print)
Mobile Networking
Image recognition
Secure payment transaction (NFC)
NFC is a proximity wireless communication technology which enables data transfer with zero click
sharing at a distance of 4cm or less and operating at 13.56 MHZ.NFC is based on and extends on
RFID(Radio frequency identification).
Mobile payments
Global mobile transactions predicted to be US$241 billion in 2011 growing to more than $1 Trillion by 2015
While the rest of the world trial/dream of payment by mobile, in Japan it is already a way of life.
ComScore (February 2011) research indicates that in December 2010 alone, 9.8 million of Japanese mobile
subscribers used their mobile wallet to make a purchase
Global sales of NFC-equipped smartphones increased tenfold to 30 million units in 2011, according to a
report from Berg Insight. The research firm estimates that by 2016 there will more than 700 million handsets
with NFC capabilities
CURRENT DEPLOYMENTS
Multiplayer Gaming
Game Score Sharing
Multimedia Transfer
Authentication
NFC –Shopping
NFC- Device Pairing
NFC – Information gathering
NFC -Bank Transaction
NFC –Tag Reading
NFC –Metro Authentication
NFC – Public Buses
NFC -Coupons
UK's first NFC advertising campaign
NFC -Loyalty Card
NFC – Social Networking
NFC - MAPS
ENOUGH OF NFC – LETS TALK ABOUT
TECHNOLOGY BEHIND
NFC works in the 13.56MHz radiofrequency spectrum, using less than 15mA of power to
communicate data over distances that are usually far less than 20cm. Tags typically store
between 96 and 512 bytes of data and transfer data using at speeds of 106Kb/s, 212Kb/s,
424Kb/s or 848Kb/s – enough to move small pieces of information virtually instantaneously,
as is essential in high-volume transport applications.
The real value of NFC, however, comes not from its technical workings but from the protocols
that have been built around it. By setting standards and building layers of abstraction on top
of core NFC functionality, smartphone platform vendors can give developers a rich set of
interfaces for interacting with the NFC ecosystem.
MODES OF COMMUNICATION :
Reader Mode :
Writer Mode :
Card Emulation Mode :
Peer To Peer Mode :
SECURITY ASPECTS :
HardWare :
At the moment the two major players in the smart card market, NXP Semiconductors and Sony ,
have implemented a proprietary encryption for their products:
1. Sony – Felica
2. NXP – Mifare
Sony felica encryption key is dynamically generated each time mutual authentication is performed.
Current Adoption - Triple DES algorithm
Future - FeliCa announced in June 2011 will have enhanced security adopting the Advanced
Encryption Standard (AES) encryption.
NXP mifare uses AES-128 bit encryption algorithm .
Software :
No Security
The NFC technology is almost exclusively used for mobile payment and ticketing. Therefore,
it is necessary to develop tools and techniques to assess and improve the security of NFC-
devices and services
Basic Idea
IMPLEMENTATION :
AES- Cryptography Algortithm :
1. KeyExpansion—round keys are derived from the cipher key using Rijndael's key schedule
2. Initial Round
1. AddRoundKey—each byte of the state is combined with the round key using bitwise xor
3. Rounds
1. SubBytes—a non-linear substitution step where each byte is replaced with another according
to a lookup table.
2. ShiftRows—a transposition step where each row of the state is shifted cyclically a certain
number of steps.
3. MixColumns—a mixing operation which operates on the columns of the state, combining the
four bytes in each column.
4. AddRoundKey
4. Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey
 The given application presented here can be used to Encrypt
any data using AES cryptography on Android platform .
THE APPLICATION PROTOTYPE:
(MOBILE WALLET)
Application –NFC Reader (Reader –Writer Mode)
Application –Peer to Peer Communication using NFC
CONCLUSION :
Secure Mobile Wallet is the product belonging to the latest technology trends in mobile
communications and IT security. The aim of the design is to provide people a more flexible way to
use cash and credit cards securely.
Future Work :
Our research and development in the near future will include:
1.Developing Applications on top of core NFC functionality. Biometric Authentication system
Improving Security on Mobile Payments.
2.Integrating NFC with Surface Computing to reach one step further in field Communications.
Transfer small files between devices (e.g. phone -> desktop) via NFC
Automatically lock/unlock desktop when you tap the computer with your phone
Tap credit card on computer to automatically pay for an item or autofill cc details on checkout
page
3. Integrating NFC(Android) with Point Cloud Library to make further enhancements in the field of
medical Imaging.
REFERENCES :
 Journal Paper
 [1] Ernst Haselsteiner and Klemens Breitfuß, “Security in Near Field Communication (NFC)”
 [2] Hao Zhao, Sead Muftic,” The Concept of Secure Mobile Wallet”
 [3] CollinMulliner,“Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”
 [4] Riti Chowdhury and Debashis De, “Secure Money Transaction in NFC Enabled Mobile
Wallet Using Session Based Alternative Cryptographic Techniques”
 [5] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis,
 ” Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”
Nishank Magoo
nishankmagoo.com

More Related Content

What's hot

NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
ADITYA GUPTA
 

What's hot (20)

e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Thinaire deck redux
Thinaire deck reduxThinaire deck redux
Thinaire deck redux
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tag
 
Nfc kdr
Nfc kdrNfc kdr
Nfc kdr
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Tap into NFC Showcase - Shanghai
Tap into NFC Showcase - ShanghaiTap into NFC Showcase - Shanghai
Tap into NFC Showcase - Shanghai
 
Android HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCAndroid HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFC
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
NFC in direct mail: The pros and cons
NFC in direct mail: The pros and consNFC in direct mail: The pros and cons
NFC in direct mail: The pros and cons
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overview
 
NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities
 
ReiterNokia
ReiterNokiaReiterNokia
ReiterNokia
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication Applications
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 

Viewers also liked

Near field communication new
Near field communication newNear field communication new
Near field communication new
Sanu Varghese
 
near field communication
near field communicationnear field communication
near field communication
Nitish Tanwar
 

Viewers also liked (20)

Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
 
A Librarian's Field Guide to Near Field Communication
A Librarian's Field Guide to Near Field CommunicationA Librarian's Field Guide to Near Field Communication
A Librarian's Field Guide to Near Field Communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Le guide de la convergence ooh 2015
Le guide de la convergence ooh 2015Le guide de la convergence ooh 2015
Le guide de la convergence ooh 2015
 
Near field communication - NFC
Near field communication  - NFCNear field communication  - NFC
Near field communication - NFC
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC
NFCNFC
NFC
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
near field communication
near field communicationnear field communication
near field communication
 
Nfc
NfcNfc
Nfc
 
Le nfc
Le nfcLe nfc
Le nfc
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 

Similar to Near field communication

An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
Hussain Shah
 
Near field communication
Near field communicationNear field communication
Near field communication
Dipen Jain
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
GHADA SALEH
 
Near field communication
Near field communicationNear field communication
Near field communication
Nagesh Mishra
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
IJRAT
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
Sandip Murari
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
Naveen Sampath
 
Nfc forum marketing_white_paper
Nfc forum marketing_white_paperNfc forum marketing_white_paper
Nfc forum marketing_white_paper
workyao
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
student
 

Similar to Near field communication (20)

An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
 
NFC
NFCNFC
NFC
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
White Paper NFC Security
White Paper NFC SecurityWhite Paper NFC Security
White Paper NFC Security
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
Nfc forum marketing_white_paper
Nfc forum marketing_white_paperNfc forum marketing_white_paper
Nfc forum marketing_white_paper
 
Nfc
Nfc Nfc
Nfc
 
NFC Bridging the Internet of Things
NFC Bridging the Internet of ThingsNFC Bridging the Internet of Things
NFC Bridging the Internet of Things
 
Near field commmunication
Near field commmunicationNear field commmunication
Near field commmunication
 
NFC tech
NFC techNFC tech
NFC tech
 
Nfc technology fit 1012
Nfc technology fit 1012Nfc technology fit 1012
Nfc technology fit 1012
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nfc technology ppt
Nfc technology pptNfc technology ppt
Nfc technology ppt
 
Nfctechnologyppt
NfctechnologypptNfctechnologyppt
Nfctechnologyppt
 

Recently uploaded

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Near field communication

  • 1. Near Field Communication It's got the potential to change how we pay for things and even open doors (and all by using our smartphones), but what is NFC and how does it work?
  • 2. Mobile has emerged from a device that was used for mere calling other people to a device that includes powerful apps that have capabilities for almost anything one can imagine of : Multimedia High definition graphics (Tegra 3 ) Database management Artificial Intelligence (SIRI) Cloud Printing (Cloud Print) Mobile Networking Image recognition Secure payment transaction (NFC)
  • 3. NFC is a proximity wireless communication technology which enables data transfer with zero click sharing at a distance of 4cm or less and operating at 13.56 MHZ.NFC is based on and extends on RFID(Radio frequency identification).
  • 4. Mobile payments Global mobile transactions predicted to be US$241 billion in 2011 growing to more than $1 Trillion by 2015 While the rest of the world trial/dream of payment by mobile, in Japan it is already a way of life. ComScore (February 2011) research indicates that in December 2010 alone, 9.8 million of Japanese mobile subscribers used their mobile wallet to make a purchase Global sales of NFC-equipped smartphones increased tenfold to 30 million units in 2011, according to a report from Berg Insight. The research firm estimates that by 2016 there will more than 700 million handsets with NFC capabilities
  • 12. NFC – Information gathering
  • 16. NFC – Public Buses
  • 18. UK's first NFC advertising campaign
  • 20. NFC – Social Networking
  • 21.
  • 22.
  • 24. ENOUGH OF NFC – LETS TALK ABOUT TECHNOLOGY BEHIND
  • 25. NFC works in the 13.56MHz radiofrequency spectrum, using less than 15mA of power to communicate data over distances that are usually far less than 20cm. Tags typically store between 96 and 512 bytes of data and transfer data using at speeds of 106Kb/s, 212Kb/s, 424Kb/s or 848Kb/s – enough to move small pieces of information virtually instantaneously, as is essential in high-volume transport applications. The real value of NFC, however, comes not from its technical workings but from the protocols that have been built around it. By setting standards and building layers of abstraction on top of core NFC functionality, smartphone platform vendors can give developers a rich set of interfaces for interacting with the NFC ecosystem.
  • 30. Peer To Peer Mode :
  • 32. HardWare : At the moment the two major players in the smart card market, NXP Semiconductors and Sony , have implemented a proprietary encryption for their products: 1. Sony – Felica 2. NXP – Mifare Sony felica encryption key is dynamically generated each time mutual authentication is performed. Current Adoption - Triple DES algorithm Future - FeliCa announced in June 2011 will have enhanced security adopting the Advanced Encryption Standard (AES) encryption. NXP mifare uses AES-128 bit encryption algorithm . Software : No Security The NFC technology is almost exclusively used for mobile payment and ticketing. Therefore, it is necessary to develop tools and techniques to assess and improve the security of NFC- devices and services
  • 35. AES- Cryptography Algortithm : 1. KeyExpansion—round keys are derived from the cipher key using Rijndael's key schedule 2. Initial Round 1. AddRoundKey—each byte of the state is combined with the round key using bitwise xor 3. Rounds 1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. ShiftRows—a transposition step where each row of the state is shifted cyclically a certain number of steps. 3. MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. 4. AddRoundKey 4. Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey
  • 36.  The given application presented here can be used to Encrypt any data using AES cryptography on Android platform .
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Application –NFC Reader (Reader –Writer Mode)
  • 43. Application –Peer to Peer Communication using NFC
  • 45. Secure Mobile Wallet is the product belonging to the latest technology trends in mobile communications and IT security. The aim of the design is to provide people a more flexible way to use cash and credit cards securely. Future Work : Our research and development in the near future will include: 1.Developing Applications on top of core NFC functionality. Biometric Authentication system Improving Security on Mobile Payments. 2.Integrating NFC with Surface Computing to reach one step further in field Communications. Transfer small files between devices (e.g. phone -> desktop) via NFC Automatically lock/unlock desktop when you tap the computer with your phone Tap credit card on computer to automatically pay for an item or autofill cc details on checkout page 3. Integrating NFC(Android) with Point Cloud Library to make further enhancements in the field of medical Imaging.
  • 46. REFERENCES :  Journal Paper  [1] Ernst Haselsteiner and Klemens Breitfuß, “Security in Near Field Communication (NFC)”  [2] Hao Zhao, Sead Muftic,” The Concept of Secure Mobile Wallet”  [3] CollinMulliner,“Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”  [4] Riti Chowdhury and Debashis De, “Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques”  [5] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis,  ” Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones”