2. WHAT IS
NFC ?
NFC stands for Near Field Communication.
NFC is a short-range wireless connectivity technology that provides
intuitive, simple, and safe communication between electronic devices.
It is a wireless communication interface with a working distance limited
to about 10 cm.
3. ďą It works on the simple principle of inductive coupling.
ďą When current flows through the NFC chip, a magnetic field is
generated.
ďą This field induces electricity within the second device or an NFC
tag.
ďą The second device generates a magnetic field of its own which
is then detected by the first device.
ďą It registers this RF field and decodes it.
6. MODES OF OPERATION
READ MODE PEER-TO-PEER CARD EMULATION
SIMPLY READS AN NFC TAG TWO NFC ENABLED DEVICES
CAN EXCHANGE
INFORMATION.
PHONE CAN ACT AS A CARD
TO MAKE PAYMENTS
8. ⢠Make payments with a wave or a touch anywhere contactless card readers have
been deployed.
⢠Read information and âpick upâ special offers and discounts from smart posters or
smart billboards.
⢠Store tickets to access transportation gates, parking garages or get into events.
⢠Store personal information that will allow secure building access.
⢠Take a picture and transfer it to an NFC-enabled printer or monitor.
⢠Share business cards with other NFC-enabled phones.
12. SECURITY
⢠Whenever radio frequencies are involved, there's a potential security risk.
⢠Even though NFC transmissions must take place over very short ranges, it's possible
to pick up transmissions from much further away.
⢠It's harder to detect transmissions from passive components. Even so, an
eavesdropper could detect signals from about a meter away with the right
equipment.
⢠Data can be stolen or corrupted by an attacker easily
ďBy creating an RF field of the same frequency as that of the sender.
ďBy changing bits 1 to 0 or vice versa in a signal.
ďBy modulating carrier signal with a pause in the original signal.
13. SOLUTIONS
⢠NFC specific key agreement
ďSet of keys unique for NFC transactions
ďThis one does not require any asymmetric cryptography.
ďTherefore reduces the computational requirements significantly
⢠Secure Channel for NFC
ď Establishing a secure channel between two NFC devices is clearly the best approach to
protect against eavesdropping and any kind of data modification attack.
ď A standard key agreement protocol like Diffie-Hellmann Elliptic Curves could be applied
to establish a shared secret between two devices
⢠Chip Modification
ďThe NFC chip can be modified to constantly check its RF field while it is transmitting data.
ď The power required to attack is much larger than the power of the NFC signal.
ďHence the chip will be able to identify an attacking signal instantly
14. CONCLUSION
⢠NFC is not more insecure than other related technologies. It offers options for
encrypting data on the application layer the same way as Wi-Fi or Bluetooth,
but additionally provides safety through the requirement of very close physical
proximity.
⢠At present, the NFC technology has reached a level where
commercial launch preparation can begin and should be established.
⢠Reliability and usability of NFC applications are probably
the most striking advantages of the NFC technology and therefore important
keys to its success.
15. ⢠When compared to alternative technologies, NFC offers great advantages.
⢠It is very likely that the NFC technology will play a big role in our future
everyday life.