Escolar Documentos
Profissional Documentos
Cultura Documentos
Contents
Contents
What is NFC?
NFC Intro
Eavesdropping
Data Modification
Threats & Countermeasures Eavesdropping Data Modification Man-in-the-Middle Secure Channel Key Agreement
Man-in-theMiddle
Secure Channel
Conclusion
Contents
What is NFC?
Designed for short distance communication (up to 10 cm)
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
Contents
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
There are dedicated modes of operation Active and Passive Active means the device generates an RF field Passive means the device uses the RF field generated by the other device
July 13th, 2006
Contents
NFC Intro
Eavesdropping
Data Modification
Target
Man-in-theMiddle
Active 106 kBaud Modified Miller, 100% ASK 212 kBaud Manchester, 10% ASK
Secure Channel
Conclusion
424 kBaud
Contents
Eavesdropping
NFC Intro
Eavesdropping
I am sorry, but NFC is not secure against eavesdropping . From how far away is it possible to eavesdrop? Depends.
RF field of sender Equipment of attacker .
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
Contents
Data Modification
NFC Intro
Coded 0
1 Bit
Coded 1
1 Bit 1. Half-Bit 2. Half-Bit
Eavesdropping
1. Half-Bit 100 0
Data Modification
Man-in-theMiddle
1 Bit
Secure Channel
1. Half-Bit 100 0
Conclusion
Contents
NFC Intro
Bob
Eavesdropping
Data Modification
Alice
Man-in-theMiddle
Secure Channel
Eve
Conclusion
Contents
NFC Intro
Bob
Eavesdropping
Message Alice
Data Modification
Man-in-theMiddle
Secure Channel
Eve
Conclusion
Contents
NFC Intro
Bob
Eavesdropping
Message Alice
Data Modification
Man-in-theMiddle
Eavesdropping
Secure Channel
Eve
Conclusion
10
Contents
NFC Intro
Bob
Eavesdropping
Message Alice
Data Modification
Man-in-theMiddle
Disturb
Eavesdropping
Secure Channel
Eve
Conclusion
11
Contents
NFC Intro
Bob
Eavesdropping
Message
Alice
Data Modification
Man-in-theMiddle
Disturb
Eavesdropping
Secure Channel
Eve
Conclusion
Alice detects the disturbance and stops the protocol Check for active disturbances !
July 13th, 2006
12
Contents
NFC Intro
Bob
Eavesdropping
Alice
Data Modification
Man-in-theMiddle
Message
Eve
Secure Channel
Conclusion
13
Contents
NFC Intro
Bob
Eavesdropping
Alice
Data Modification
Man-in-theMiddle
Message
Eve
Secure Channel
Conclusion
Eve cannot send to Bob, while RF field of Alice is on! Use Active Passive connection ! Use 106 kBaud !
July 13th, 2006
14
Contents
NFC Intro
Bob
Eavesdropping
Alice
Data Modification
Man-in-theMiddle
Message
Eve
Secure Channel
Conclusion
15
Contents
NFC Intro
Bob
Eavesdropping
Alice
Data Modification
Man-in-theMiddle
Message
Eve
Secure Channel
Conclusion
Alice would receive data sent by Eve Verify answer with respect to this possible attack!
July 13th, 2006
16
Contents
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
Alice uses 106 kBaud Alice uses Active Passive mode Alice checks for disturbance Alice checks for suspicious answers from Bob
17
Contents
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
18
Contents
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Eavesdropping
Secure Channel
Conclusion
July 13th, 2006
19
Contents
NFC Intro
Eavesdropping
Alice
100 0 100
Data Modification
Man-in-theMiddle
Bob
0 200
Secure Channel
Eve
100 0
Conclusion
20
Contents
NFC Intro
Eavesdropping
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
21
Contents
Conclusion
NFC does not provide any security by itself
NFC Intro
Eavesdropping
Secure Channel is required Physical properties of NFC protect against Man-in-the-Middle Establishing a Secure Channel becomes easy
Data Modification
Man-in-theMiddle
Secure Channel
Conclusion
22