16
A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information and Management, Chinese Culture University, Taipei, Taiwan * Department of Information and Management, Chinese Culture University & Graduate Institute of Information and Computer Education, National Taiwan Normal University, Taipei, Taiwan 2011

A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Embed Size (px)

Citation preview

Page 1: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

A Secure and Practical Key Management Mechanism

for NFC Read-Write ModeHsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei

Department of Information and Management, Chinese Culture University, Taipei, Taiwan

* Department of Information and Management, Chinese Culture University & Graduate Institute of Information and Computer

Education, National Taiwan Normal University, Taipei, Taiwan

2011

Page 2: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Outline

• Introduction• NFC technological architecture• Security Analysis• NFC key management mechanism(NKMM)• Conclusion

Page 3: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Introduction• Near Field Communication (NFC) is a short-range

communication technology.• The most common service of NFC is namely

micropayments service.• NFC technology processes three modes: Card

emulation(ex.store value card), read/write (ex.cell phone as POS device), and peer to peer.

• To investigate the security issue of key management as NFC devices read and write external cards,analyze the possible risks in various solutions and propose a NFC key management mechanism(NKMM).

Page 4: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

NFC technological architecture

• Most mobile devices have the setting of Java Virtual Machine; we can install and execute MIDlet of Java ME.

• MIDlet can communicate with service providing

servers by OTA (Over the Air) via wireless communication of cell phones.

• The differences between NFC and non-NFC devices: NFC chipsets and secure element(SE).

• The SE is a smart card chipset.

Page 5: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

NFC Mobile Device Architecture

Wireless

JSR257JSR177protocol

(Store content of chip cards)

(Store applet app.)

Page 6: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Mifare Smart Card IC S50 Architecture(read-write)

Page 7: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Security Analysis

NFC security threat

Page 8: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

﹝Threats analysis﹞

T-C. MIDlet be replaced illegally and phishing menu will deceive users to transactT-D. When :cell phone lost security strength of MIDlet not strong enoughT-E. (1)MIDlet be cloned (2)MIDlet be reused illegallyT-F. IDs might be modified via illegal behaviousT-G. Storage data might be (1)delete or corruption (2)be modified into fake transaction information

T-A. DOS attack、 communication failureT-B. Cause secret data leakage

Page 9: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

.

Secure tool,identity and storage

Page 10: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

ordinary key management mechanism

• Analyzing the possible risks of the methods below.• 1) Store keys in MIDlet directly.• 2) Store the key in SE, and then obtain the key from

secure elements via MIDlet at run time.• 3) Store the key in the server side, and then obtain the

key from the server side by MIDlet at run time.• 4) Store the key in the server and then store the

authorized access token in SE. MIDlet can obtain the token from SE and then obtain the key from the server at run time.

Page 11: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

• Personalizing time and runtime time.

NFC key management mechanism(NKMM)

Personalizing time

clean room

server

SE chipset identity ID(SEID)2.

3. RSA pair key(SnPubKey,SnPriKey)

4.

Key Store

5. SEID

SecurityElement

1.applet

MIDlet

ServerNFC handset

SnPubKey

SnPriKey5.

Page 12: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

NKMM runtime

1. Enter password 、 initial applet

2. Applet generate a challenge session ID(CID) and PKI pair key(CPubKey,CPriKey).

3. Applet send R1 and SEID to MIDlet.

4. Send R1 and SEID to server.

5.Check whether SEID legal issued applet.

if YES→find out matching SnPriKey according to SEID for decription and computing

DEC SnPriKey(R1) to obtain CID and CPubKey computing result ENCCPubKey(CID,MK) from MK

encryption will be marked as R2.

7.Send server response’s information R2 into SE applet.

8.SE applet decrypts and computes DEC CPriKey(R2) to obtain CID & MK,and send MK back if

CID matches.

9. MIDlet applies MK on external Mifare authentication.

10. MIDlet obtains Mifare access authorization and removes MK at the end.

R2 MK

Page 13: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Sequence Diagram

Page 14: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Implementation

• Performed a half-year trail run of NKMM system on the delivery service to one university.

• Implemented Nokia 6212 as the mobile contactless POS to conduct debit transaction on the campus cards.

• After the user enables the token of MIDlet, the key obtaining would be finished in about 2 seconds.

• No users complained about the 2 second initial process. It proves the efficacy of our implementing system.

Page 15: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

Conclusion

• As to hardware, if the Applet can send the key directly into the NFC controller without through MIDlet to authenticate the external tag, the risk of sniffing the runtime memory can be reduce.

• As to software, the http request from MIDlet to the server cannot be identified by the server and checked whether the request is sent by MIDlet, it cause the inability of interlocking between the server side and the MIDlet side. In the standard of J2ME, there will be a bottom layer mechanism to take the MIDlet identity out from the http head and enhance the security.

Page 16: A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information

THE END