International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905 Accessory authentication on NFC enabled product using three pass AES algorithm Sukrutha C Basappa 1 , Nagaraja G S 2 1 MTech student at R V College of Engineering, Bengaluru, Karnataka 2 Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, Near Field Communication (NFC) market is no more a monopoly. Competition is high among the companies with regard to products they manufacture and their features for consumer attraction. Mutual authentication between NFC reader and tag ensures safe communication between them. This paper proposes an accessory authentication model that guarantees that counterparts of a product are of same company. AES-128 bits algorithm is used in two different modes, that is AES-ECB and AES-CBC for mutual authentication. AES-CBC mode is stronger in terms of security when compared to AES-ECB mode. Key Words: AES, Brand protection, Mutual authentication, NFC, Security. 1. INTRODUCTION NFC technology was developed in the year 2004 by Philips Electronics and Sony. It is a short range, wireless technology with operating area within 10 centimeters, operating frequency 13.56 MHz and data transmission rate used here is of 106 kbps. The objective of the paper is to develop an accessory authentication model for an NFC enabled product. This ensures that replaceable part of the product (NFC tag) and the fixed part (active NFC reader) are paired counterparts and are of the same company. With this end-user can get high quality product. This kind of product positively impacts manufacturing and authenticating companies, thereby ensuring brand protection. Some examples are authentication in motorized tooth brush, where brush handle has NFC reader and the brush head has NFC tag in it. In high end blenders, the base unit will have NFC reader and the jar/container will have NFC tag.[12] To achieve this, firstly communication is established among the NFC reader and the tag. Then three pass AES (Advanced Encryption Standard) algorithm is run, before actual data transfer happens. AES-128 is a symmetric block cipher, that uses one shared secret key for both encryption and decryption. Choice for mode of AES is provided. User can choose authentication to happen either in AES-ECB (Electronic Code Book) or in AES-CBC (Cipher Block Chaining) mode, depending on their requirement. 2. LITERATURE SURVEY In [1], authors have used the fact that NFC has an operating mode called read or write. This has the property of one directional transfer of data only. However, they have tried to bring in a bi-directional model that is half duplex in nature. Main advantage of this operating mode of NFC is that, it allows different data formats and very low protocol overhead. But one main challenge is regarding the reader collision problem, completing transactions in a secure way, within a time frame. Fingerprint and Kerberos are two factor authentication used. In [2], a smart bandage with wireless temperature and strain sensor, with passive NFC tag is designed. An android application called SenseAble was built, to display the body temperature and other sensor readings. Chest expansion and contraction of a Covid-19 patient was rightly monitored by this smart bandage. In [3], it proves that MITM attacks can be done during NFC communication, when using a passive card. This method of attack mimics real implementation of EMV protocol enabling devices, used for payments. Paper demonstrates how a contactless payment system can be compromised by an attacker, by using a malicious MITM card. In [4], study is done on reading range of implanted sensors, based on NFC Integrated circuit (IC) by using a NFC enabled smart phone. Challenges noted were low coupling between loops of various sizes and limited quality imposed by bandwidth communication. Results show that system with three coils performs better at longer distance than 2-coil system. In [5], a scheme to build a new public transport payment method with different technologies like NFC, Bluetooth, IC card is integrated. Advantage is that, passengers can choose the payment method that suits them, in terms of discount on ticket fare. This solves the problem that the payment platforms are not unified and that passengers have many applications on their mobile, which causes inconvenience while travelling. In [6], a model for vehicle network operators using NFC is proposed. Tourists generally will not use local mobile operator’s services, as they stay for short time and the roaming charges are also high. As a solution, the model which allows less mobile traffic cost for tourist and has increased transaction security is proposed. Here the user’s mobile traffic is routed to the network of vehicle rental service