Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Ha Van Nguyen , Hwajeong Seo , Howon Kim

ABSTRACT

Near Field Communication (NFC) technology has been used more and more widely nowadays due to some undeniable interactive advantages. There are variety of NFC applications has been developed and used in business like bank transaction, public transport, commercial services, guided shopping, NFC access control and coupon. As a result, it has raised some new threats like hackers, card crimes and other privacy issues. For that reason, in this paper, we would like to contribute a method for securing NFC communication by applying a simple and lightweight cryptography algorithm. To illustrate the feasibility, we develop an NFC payment program in Android devices using lightweight encryption algorithm (LEA) and advanced encryption standard (AES) to make data confidentially. The performance of these two cryptography algorithms has been estimated and the result shows that LEA is much more advantageous than AES when applying in NFC application in which the small amount of data is saved to the card. More... »

PAGES

191-203

References to SciGraph publications

Book

TITLE

Future Data and Security Engineering

ISBN

978-3-319-12777-4
978-3-319-12778-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-12778-1_15

DOI

http://dx.doi.org/10.1007/978-3-319-12778-1_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1037726098


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Van Nguyen", 
        "givenName": "Ha", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Hwajeong", 
        "id": "sg:person.015101423711.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.3390/s140100975", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000747930"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-05149-9_1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1053702235", 
          "https://doi.org/10.1007/978-3-319-05149-9_1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iciw.2009.112", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093414241"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "Near Field Communication (NFC) technology has been used more and more widely nowadays due to some undeniable interactive advantages. There are variety of NFC applications has been developed and used in business like bank transaction, public transport, commercial services, guided shopping, NFC access control and coupon. As a result, it has raised some new threats like hackers, card crimes and other privacy issues. For that reason, in this paper, we would like to contribute a method for securing NFC communication by applying a simple and lightweight cryptography algorithm. To illustrate the feasibility, we develop an NFC payment program in Android devices using lightweight encryption algorithm (LEA) and advanced encryption standard (AES) to make data confidentially. The performance of these two cryptography algorithms has been estimated and the result shows that LEA is much more advantageous than AES when applying in NFC application in which the small amount of data is saved to the card.", 
    "editor": [
      {
        "familyName": "Dang", 
        "givenName": "Tran Khanh", 
        "type": "Person"
      }, 
      {
        "familyName": "Wagner", 
        "givenName": "Roland", 
        "type": "Person"
      }, 
      {
        "familyName": "Neuhold", 
        "givenName": "Erich", 
        "type": "Person"
      }, 
      {
        "familyName": "Takizawa", 
        "givenName": "Makoto", 
        "type": "Person"
      }, 
      {
        "familyName": "K\u00fcng", 
        "givenName": "Josef", 
        "type": "Person"
      }, 
      {
        "familyName": "Thoai", 
        "givenName": "Nam", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-12778-1_15", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-12777-4", 
        "978-3-319-12778-1"
      ], 
      "name": "Future Data and Security Engineering", 
      "type": "Book"
    }, 
    "name": "Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA", 
    "pagination": "191-203", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-12778-1_15"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "b3b6e76effe5b1bb2be76db7c1b7463b12f3b94eef86c8a5bd0ea60dfdb7b58d"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1037726098"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-12778-1_15", 
      "https://app.dimensions.ai/details/publication/pub.1037726098"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T16:18", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8675_00000266.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-12778-1_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12778-1_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12778-1_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12778-1_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12778-1_15'


 

This table displays all metadata directly associated to this object as RDF triples.

113 TRIPLES      23 PREDICATES      30 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-12778-1_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N7bcdd4cb8615449aa3b8148e99800850
4 schema:citation sg:pub.10.1007/978-3-319-05149-9_1
5 https://doi.org/10.1109/iciw.2009.112
6 https://doi.org/10.3390/s140100975
7 schema:datePublished 2014
8 schema:datePublishedReg 2014-01-01
9 schema:description Near Field Communication (NFC) technology has been used more and more widely nowadays due to some undeniable interactive advantages. There are variety of NFC applications has been developed and used in business like bank transaction, public transport, commercial services, guided shopping, NFC access control and coupon. As a result, it has raised some new threats like hackers, card crimes and other privacy issues. For that reason, in this paper, we would like to contribute a method for securing NFC communication by applying a simple and lightweight cryptography algorithm. To illustrate the feasibility, we develop an NFC payment program in Android devices using lightweight encryption algorithm (LEA) and advanced encryption standard (AES) to make data confidentially. The performance of these two cryptography algorithms has been estimated and the result shows that LEA is much more advantageous than AES when applying in NFC application in which the small amount of data is saved to the card.
10 schema:editor N2b91f2b70d854ef6bdef9685b3e327f3
11 schema:genre chapter
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf Ned69570c477441748bcf0a3aabea1292
15 schema:name Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA
16 schema:pagination 191-203
17 schema:productId N83f227d4a6df4541bf3eadb0f013d631
18 Nccd702920e444f6fbe00bef1ec4d8ef2
19 Nf10b917eb0de468caa29b2b7e5e0aa0b
20 schema:publisher Na769177da1cf48908c6b4f3c47611db3
21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037726098
22 https://doi.org/10.1007/978-3-319-12778-1_15
23 schema:sdDatePublished 2019-04-15T16:18
24 schema:sdLicense https://scigraph.springernature.com/explorer/license/
25 schema:sdPublisher N601997ea758642d5ae5fb00bb6ed8114
26 schema:url http://link.springer.com/10.1007/978-3-319-12778-1_15
27 sgo:license sg:explorer/license/
28 sgo:sdDataset chapters
29 rdf:type schema:Chapter
30 N070a98823aed4b3b8857bcc0dcb2ced9 rdf:first sg:person.015101423711.26
31 rdf:rest Nc8508d98fb224168933d81ce8b0daaec
32 N1508cead76bf4e428f685c201e58ade7 schema:familyName Wagner
33 schema:givenName Roland
34 rdf:type schema:Person
35 N2b91f2b70d854ef6bdef9685b3e327f3 rdf:first N6ce68f1bc2654046b97df15101da75e2
36 rdf:rest N77e0adf9f4ac4641bf6186e952892c2a
37 N347c1d2743d34be989e7b5cee051aa6f schema:affiliation https://www.grid.ac/institutes/grid.262229.f
38 schema:familyName Van Nguyen
39 schema:givenName Ha
40 rdf:type schema:Person
41 N4e8f275c513b475b902b8a09e82582ee schema:familyName Neuhold
42 schema:givenName Erich
43 rdf:type schema:Person
44 N600c0479839640b0b13ead06bac737c8 rdf:first Nf35e2b9a1c1c4900afedc2785f8901a4
45 rdf:rest rdf:nil
46 N601997ea758642d5ae5fb00bb6ed8114 schema:name Springer Nature - SN SciGraph project
47 rdf:type schema:Organization
48 N66237717d3364280858c825a50330724 schema:familyName Küng
49 schema:givenName Josef
50 rdf:type schema:Person
51 N6ce68f1bc2654046b97df15101da75e2 schema:familyName Dang
52 schema:givenName Tran Khanh
53 rdf:type schema:Person
54 N77e0adf9f4ac4641bf6186e952892c2a rdf:first N1508cead76bf4e428f685c201e58ade7
55 rdf:rest Na3ae9fbdd4584a6b87a9cdeb22f4a07c
56 N78b80274549941a58d74e3c2da170553 schema:familyName Takizawa
57 schema:givenName Makoto
58 rdf:type schema:Person
59 N7bcdd4cb8615449aa3b8148e99800850 rdf:first N347c1d2743d34be989e7b5cee051aa6f
60 rdf:rest N070a98823aed4b3b8857bcc0dcb2ced9
61 N83f227d4a6df4541bf3eadb0f013d631 schema:name doi
62 schema:value 10.1007/978-3-319-12778-1_15
63 rdf:type schema:PropertyValue
64 Na3ae9fbdd4584a6b87a9cdeb22f4a07c rdf:first N4e8f275c513b475b902b8a09e82582ee
65 rdf:rest Ndd6ae3789f3f43b0a38f38193198919d
66 Na44935f0201d46e38b7bc8d66228a144 rdf:first N66237717d3364280858c825a50330724
67 rdf:rest N600c0479839640b0b13ead06bac737c8
68 Na769177da1cf48908c6b4f3c47611db3 schema:location Cham
69 schema:name Springer International Publishing
70 rdf:type schema:Organisation
71 Nc8508d98fb224168933d81ce8b0daaec rdf:first sg:person.010610076315.82
72 rdf:rest rdf:nil
73 Nccd702920e444f6fbe00bef1ec4d8ef2 schema:name readcube_id
74 schema:value b3b6e76effe5b1bb2be76db7c1b7463b12f3b94eef86c8a5bd0ea60dfdb7b58d
75 rdf:type schema:PropertyValue
76 Ndd6ae3789f3f43b0a38f38193198919d rdf:first N78b80274549941a58d74e3c2da170553
77 rdf:rest Na44935f0201d46e38b7bc8d66228a144
78 Ned69570c477441748bcf0a3aabea1292 schema:isbn 978-3-319-12777-4
79 978-3-319-12778-1
80 schema:name Future Data and Security Engineering
81 rdf:type schema:Book
82 Nf10b917eb0de468caa29b2b7e5e0aa0b schema:name dimensions_id
83 schema:value pub.1037726098
84 rdf:type schema:PropertyValue
85 Nf35e2b9a1c1c4900afedc2785f8901a4 schema:familyName Thoai
86 schema:givenName Nam
87 rdf:type schema:Person
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
95 schema:familyName Kim
96 schema:givenName Howon
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
98 rdf:type schema:Person
99 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
100 schema:familyName Seo
101 schema:givenName Hwajeong
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
103 rdf:type schema:Person
104 sg:pub.10.1007/978-3-319-05149-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053702235
105 https://doi.org/10.1007/978-3-319-05149-9_1
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/iciw.2009.112 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093414241
108 rdf:type schema:CreativeWork
109 https://doi.org/10.3390/s140100975 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000747930
110 rdf:type schema:CreativeWork
111 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
112 schema:name Pusan National University
113 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...