Total views : 207

A Study on the Cryptographic Algorithm for NFC


  • Department of Motion Art Design, Namseoul University, 91 Daehak-ro Seonghwan-eup Sebuk-gu Cheonan-si Chungcheongnam-do, 31020, Korea, Republic of


Objectives:Currently, NFC leads the mobile payment market. In such a situation, leakage and change of payment information and leakage of personal information by cracking can cause serious social problem. Accordingly, the coding technique used for security of NFC should be safer than now. Methods/Statistical Analysis:Though AES currently used in security of NSF is a safe coding technique, it is not equipped with certifying function. Thus, this paper, by combining AES with Modification Detection Code and Message Authentication Code, suggests an encryption algorithm with authentication function. Findings:To strengthen authentication function and integrity function, the new symmetric encryption algorithm was designed not to predictable relation and input-output relations of hash function. By simultaneously using Message Authentication Code and Modification Detection Code where blocked hand-shake method is applied, it is encryption algorithm suitable to the NFC environment.The encryption algorithm suggested in the paper generates hash values corresponding to Modification Detection Code and Message Authentication Code, along with the RD-I and RD-II part and the encryption part. Such hash values perform authentication functions using only output of the suggested algorithm without securing a separate authentication channel. Improvements/Applications:The suggested encryption algorithm combines existing Message Authentication Code and Modification Detection Code to use them for authentication. Consequently, it will guarantee authentication and encryption functions by securing a safer NFC communication channel.


AES, Cryptographic, NFC, Security.

Full Text:

 |  (PDF views: 364)


  • Near-field communication (NFC) [Internet]. [cited 2016 Sep 20]. Available from:
  • Advanced Encryption Standard (AES) [Internet]. [cited 2016 Sep 15]. Available from:
  • Serpent cryptography on static and dynamic reconfigurable hardware [Internet]. [cited 2006 Mar 08]. Available from:
  • Security in Near Field Communication (NFC) [Internet]. [cited 2006 Jan]. Available from:
  • Roland M, Langer J, Scharinger J. Security vulnerabilities of the NDEF signature record type. 2011 3rd International Workshop on Near Field Communication; 2011 Feb. p. 65–70.
  • Damgard IB, Denmark AC. Collision free hash functions and public key signature schemes. EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques; 1987. p. 203–16.
  • Analysis and design of cryptographic hash functions [Internet]. [cited 2003 Feb]. Available from:
  • Kar J, Majhi B. An efficient password security of three-party key exchange protocol based on ECDLP. International Journal of Security and Security. 2009 Nov; 3(5):405–13.
  • Anderson R. The classification of hash functions. Proceedings of the 4th Institute of Management Accountants Conference on Cryptography and Coding; 1995. p. 83–94.
  • Dobbertin H. Cryptanalysis of MD-4. Journal of Cryptology. 1998 Sep; 11(4):253–71.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.