News Category

Technical support

skype

email

phone

rfid163

tech@chafon.com

+8618620323425

Contact us

skype

email

phone

angela.chafon

sales@chafon.com

+86-15976893202

Alibaba

RFID News

From:chafanViews:247Date:2020-06-12

 Although the range of NFC is limited to a few centimeters, plain NFC does not ensure secure communications. In 2006, Ernst Haselsteiner and Klemens Breitfuß described possible attacks and detailed how to leverage NFC's resistance to man-in-the-middle attacks to establish a specific key. As this technique is not part of the ISO standard, NFC offers no protection against eavesdropping and can be vulnerable to data modifications. Applications may use higher-layer cryptographic protocols (e.g. SSL) to establish a secure channel.

The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on multiple parameters, but is typically less than 10 meters.Also, eavesdropping is highly affected by the communication mode. A passive device that doesn't generate its own RF field is much harder to eavesdrop on than an active device. An attacker can typically eavesdrop within 10 m of an active device and 1 m for passive devices.

Because NFC devices usually include ISO/IEC 14443 protocols, relay attacks are feasible.[[page needed] For this attack the adversary forwards the request of the reader to the victim and relays its answer to the reader in real time, pretending to be the owner of the victim's smart card. This is similar to a man-in-the-middle attack. One libnfc code example demonstrates a relay attack using two stock commercial NFC devices. This attack can be implemented using only two NFC-enabled mobile phones.