SlideShare a Scribd company logo
NFC
NFCIP & NFC-SEC STANDARDS
Content
About NFC
• NFC work principle
• NFC standards
Security
• Threats and Solutions
• NFC –SEC standards
Conclusions
About NFC
WORK PRINCIPLE
NFC
• NFC employs electromagnetic induction between two loop antennas
when NFC devices.
About NFC
NFC STANDARDS
NFC Standards
• NFC approved as an ISO/IEC standard and as an ECMA standard.
• ISO/IEC 18092 / ECMA-340 – NFCIP-1
• ISO/IEC 21481/ECMA-352 – NFCIP-2
• Incorporates a variety of existing standards ( ISO/IEC 14443 )
• NFC Forum defined a common data format (NDEF)
NFCIP-1 ISO/IEC 18092 / ECMA-340
• Defines the communication modes for NFCIP-1 using inductive coupled
devices operating at the centre of 13,56 MHz.
• Defines Active and the Passive communication modes.
• Specifies modulation schemes, codings, transfer speeds, and frame format
of the RF interface.
• Specifies initialisation schemes and conditions required for data collision
control during initialisation.
• Defines transport protocol including protocol activation and data Exchange
methods.
• Transfer speeds are 106 kbit/s, 212 kbit/s and 424 kbit/s, for passive-active
modes.
NFC – ISO/IEC 21481 / ECMA-352 – NFCIP-2
• Specifies the communication mode selection mechanism, designed
not to disturb any outgoing communication at 13,56 MHz.
• Only for devices implementing ECMA-340, ISO/IEC 14443 or ISO/IEC
15693.
• Requires implementations to enter the selected communication
mode as specified in the respective standard.
• Communication mode specifications are outside of this Standard.
NFC Security
THREATS, SOLUTIONS AND STANDARDS
NFC Security- Threats and Solutions
Threats Solutions and recommendations
Eavesdropping Secure channel
Data Corruption Counter attack
Data modification Using 106k Baud Rate, SCH
Data insertion No delay, listening channel, SCH
Man in the middle attack
Active-passive communication, listening the
channel
ECMA-385 NFC-SEC
• Specifies NFC secure channel and shared secret services for NFCIP-1
and PDUs and protocol for those services.
• Shared secret provides a key
for propietary encryption
• Secure cannel encrypts data
ECMA-385 NFC-SEC
• Follows the following OSI model.
ECMA-385 NFC-SEC. Protocol Mechanisms
• Shall establish a shared secret using
ACT_REQ and ACT_RES.
• Shall verify their agreed shared secret
usingVFY_REQ andVFY_RES.
• SCH service shall protect data exchange,
using ENC.
• Shall terminate SSE and SCH usingTMN.
ECMA 386 NFC-SEC Cryptography Standard
• NFC – SEC- 01 provides:
Message contents with concatenation rules for keys and other fields
Key primitives
Random number requirements
Conversion and transformation rules
Cryptographic algorithms and methods
• Enables communication between NFCIP-1 devices which do not share
any keys before communicating each other.
• NFC-SEC-01 vulnerable for MITM attacks
ECMA 386 NFC-SEC Cryptography Standard
using ECDH and AES.
• Specifies the message contents and the cryptographic methods for
PID 01.
• ECDH curve p-192 key exchange – 192 bit
• Key derivation and confirmation – AES 128 bit
• Data encryption – AES 128 bit
• Data integrity – AES 128 bit
Conclusions
POINTS TO TAKE INTO ACCOUNT
Conclusions
• NFC by itself cannot provide protection against eavesdropping or
data modifications.
• The only solution is to establish a secure channel.
• MITM is not a high risk, since NFC short operating distance and RF
characteristics
• Due to the difficult of the MITM attack, a DH protocol can be applied.
• NFC-SEC standard provides the SSE and SCH services for p2p mode.
References
• ECMA 385
http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-385.pdf
• ECMA 386
http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-386.pdf
• ECMA 340
https://www.ecma-international.org/publications/files/ECMA-ST/Ecma-340.pdf
• ECMA 352
https://www.ecma-international.org/publications/files/ECMA-ST/ECMA-352.pdf
• Security in Near Field Communication (NFC)
http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf
Thank you
For your attention

More Related Content

PPTX
MIMO Calculation
PPTX
wireless communication system
PPTX
Chap 4 (large scale propagation)
PDF
Mobile Communication
PPTX
3g cellular telephony
PPT
Unguided media in Networks
PPTX
Introduction to 5g technology
MIMO Calculation
wireless communication system
Chap 4 (large scale propagation)
Mobile Communication
3g cellular telephony
Unguided media in Networks
Introduction to 5g technology

What's hot (20)

PPTX
PPTX
Gsm security algorithms A3 , A5 , A8
PPT
Presentation on CDMA
PPTX
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
PPTX
5G Antenna Technology
PDF
IEEE 802.11 Architecture and Services
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
PPTX
Ad hoc networks
PPT
Switching
PPTX
Iot architecture
PPTX
Spread spectrum
PPTX
WiMax - Technology & Architecture
ODP
UMTS, Introduction.
PPTX
Long Term Evolution Technologies, 3G & 4G.
PPTX
5G applications
PPT
Evaluation of cellular network
PPT
Concept of Network Routing Layer
PPT
Wsn 08
PDF
Mobile computing (Wireless) Medium Access Control (MAC)
Gsm security algorithms A3 , A5 , A8
Presentation on CDMA
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
5G Antenna Technology
IEEE 802.11 Architecture and Services
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Ad hoc networks
Switching
Iot architecture
Spread spectrum
WiMax - Technology & Architecture
UMTS, Introduction.
Long Term Evolution Technologies, 3G & 4G.
5G applications
Evaluation of cellular network
Concept of Network Routing Layer
Wsn 08
Mobile computing (Wireless) Medium Access Control (MAC)
Ad

Viewers also liked (20)

PPTX
NFC technical presentation
PDF
Trf7960 and trf7970 a comparison
PDF
Vanderhoof smartcard-roadmap
PDF
Lp 2010 operation-theory
PPTX
Rfid簡報
PDF
Nfc technology
PDF
RFID and NFC Providing the last yards for IoT
PDF
Ask Contactless Terminals
PPT
Contactless (Proximity) Smartcards
PDF
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
PPT
Civintec introduction 2015
PPT
NFC Basic Concepts
PPTX
NFC(Near Field Communication)
PDF
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
PPT
PPT
Nfc ppt
PDF
Near Field Communication (NFC)
PPTX
NFC Technology
PPTX
wireless communication
PPTX
Near field communication (nfc) technology
NFC technical presentation
Trf7960 and trf7970 a comparison
Vanderhoof smartcard-roadmap
Lp 2010 operation-theory
Rfid簡報
Nfc technology
RFID and NFC Providing the last yards for IoT
Ask Contactless Terminals
Contactless (Proximity) Smartcards
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Civintec introduction 2015
NFC Basic Concepts
NFC(Near Field Communication)
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Nfc ppt
Near Field Communication (NFC)
NFC Technology
wireless communication
Near field communication (nfc) technology
Ad

Similar to NFC- Standards and Security (20)

PDF
Nfc power point
PDF
Ecma 385 Near Field Communication standard
PPTX
LALIT NFC
PPTX
Near Feild Communication (NFC)
PPTX
PPTX
Near Field Communication (NFC Architecture and Operating Modes)
PDF
Cours NFC 2019
PPTX
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
PDF
Electronic Access Control Security
PDF
Electronic Access Control Security / Безопасность электронных систем контроля...
PDF
NFC Everywhere Brochure 2016_WEB
PDF
NFC Everywhere Brochure 2016
PPTX
Near field communication.pptx
PDF
NFC architecture and standards involved -C&T RF Antennas Inc
PPTX
Near field communication
PDF
Security in NFC
PPTX
Near field communication
PPTX
Near field communication (NFC)
PPTX
Near field communication(nfc)
Nfc power point
Ecma 385 Near Field Communication standard
LALIT NFC
Near Feild Communication (NFC)
Near Field Communication (NFC Architecture and Operating Modes)
Cours NFC 2019
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
Electronic Access Control Security
Electronic Access Control Security / Безопасность электронных систем контроля...
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016
Near field communication.pptx
NFC architecture and standards involved -C&T RF Antennas Inc
Near field communication
Security in NFC
Near field communication
Near field communication (NFC)
Near field communication(nfc)

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Sustainable Sites - Green Building Construction
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
composite construction of structures.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Welding lecture in detail for understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Sustainable Sites - Green Building Construction
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Automation-in-Manufacturing-Chapter-Introduction.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
composite construction of structures.pdf
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Welding lecture in detail for understanding
Geodesy 1.pptx...............................................
Internet of Things (IOT) - A guide to understanding
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...

NFC- Standards and Security

  • 2. Content About NFC • NFC work principle • NFC standards Security • Threats and Solutions • NFC –SEC standards Conclusions
  • 4. NFC • NFC employs electromagnetic induction between two loop antennas when NFC devices.
  • 6. NFC Standards • NFC approved as an ISO/IEC standard and as an ECMA standard. • ISO/IEC 18092 / ECMA-340 – NFCIP-1 • ISO/IEC 21481/ECMA-352 – NFCIP-2 • Incorporates a variety of existing standards ( ISO/IEC 14443 ) • NFC Forum defined a common data format (NDEF)
  • 7. NFCIP-1 ISO/IEC 18092 / ECMA-340 • Defines the communication modes for NFCIP-1 using inductive coupled devices operating at the centre of 13,56 MHz. • Defines Active and the Passive communication modes. • Specifies modulation schemes, codings, transfer speeds, and frame format of the RF interface. • Specifies initialisation schemes and conditions required for data collision control during initialisation. • Defines transport protocol including protocol activation and data Exchange methods. • Transfer speeds are 106 kbit/s, 212 kbit/s and 424 kbit/s, for passive-active modes.
  • 8. NFC – ISO/IEC 21481 / ECMA-352 – NFCIP-2 • Specifies the communication mode selection mechanism, designed not to disturb any outgoing communication at 13,56 MHz. • Only for devices implementing ECMA-340, ISO/IEC 14443 or ISO/IEC 15693. • Requires implementations to enter the selected communication mode as specified in the respective standard. • Communication mode specifications are outside of this Standard.
  • 10. NFC Security- Threats and Solutions Threats Solutions and recommendations Eavesdropping Secure channel Data Corruption Counter attack Data modification Using 106k Baud Rate, SCH Data insertion No delay, listening channel, SCH Man in the middle attack Active-passive communication, listening the channel
  • 11. ECMA-385 NFC-SEC • Specifies NFC secure channel and shared secret services for NFCIP-1 and PDUs and protocol for those services. • Shared secret provides a key for propietary encryption • Secure cannel encrypts data
  • 12. ECMA-385 NFC-SEC • Follows the following OSI model.
  • 13. ECMA-385 NFC-SEC. Protocol Mechanisms • Shall establish a shared secret using ACT_REQ and ACT_RES. • Shall verify their agreed shared secret usingVFY_REQ andVFY_RES. • SCH service shall protect data exchange, using ENC. • Shall terminate SSE and SCH usingTMN.
  • 14. ECMA 386 NFC-SEC Cryptography Standard • NFC – SEC- 01 provides: Message contents with concatenation rules for keys and other fields Key primitives Random number requirements Conversion and transformation rules Cryptographic algorithms and methods • Enables communication between NFCIP-1 devices which do not share any keys before communicating each other. • NFC-SEC-01 vulnerable for MITM attacks
  • 15. ECMA 386 NFC-SEC Cryptography Standard using ECDH and AES. • Specifies the message contents and the cryptographic methods for PID 01. • ECDH curve p-192 key exchange – 192 bit • Key derivation and confirmation – AES 128 bit • Data encryption – AES 128 bit • Data integrity – AES 128 bit
  • 17. Conclusions • NFC by itself cannot provide protection against eavesdropping or data modifications. • The only solution is to establish a secure channel. • MITM is not a high risk, since NFC short operating distance and RF characteristics • Due to the difficult of the MITM attack, a DH protocol can be applied. • NFC-SEC standard provides the SSE and SCH services for p2p mode.
  • 18. References • ECMA 385 http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-385.pdf • ECMA 386 http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-386.pdf • ECMA 340 https://www.ecma-international.org/publications/files/ECMA-ST/Ecma-340.pdf • ECMA 352 https://www.ecma-international.org/publications/files/ECMA-ST/ECMA-352.pdf • Security in Near Field Communication (NFC) http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf
  • 19. Thank you For your attention