Cryptanalysis of the security applications and protocols

Posted by Amit | Security | Sunday 21 September 2008 11:35 am

I recently read an article about “NFC to emerge as the next big change for the mobile market”. The article refers the analyst report from Juniper research titled “Mobile Payment Markets: Contactless NFC 2008-2013″. Highlights from the report are

  • Global mobile subscribers with NFC phones will reach 700 million by 2013.
  • The market is currently dominated by FeliCa-enabled phones on Japanese mobile networks, where about 50 million FeliCa-enabled phones have been shipped to date.
  • North America, Western Europe and Far East & China will be the leading regions by 2013, with each region having annual shipments in excess of 25% of total NFC phone shipments.

The analyst doesn’t miss out on quoting that the issues gating the commercial success of NFC are only the un-availability of NFC phones with users & NFC readers with merchants.

One of the most popular operators in Europe carried out NFC trails recently and expressed satisfaction and has decided to roll our NFC based services.

Sometime back I posted an article about attacking the NFC phones; this report brings me to another issue I would like to focus. Weather or not NFC technology becomes successful only time will tell. In the meanwhile, now that the standard is already frozen, my question is shouldn’t such standards go through an exhaustive Cryptanalysis phase to explore the weaknesses before wider deployment? If they do can someone provide more insight into how that is done. With a number of private players entering in the High Performance Computing domain; such systems could also be used to explore strengths and weaknesses of soon to be deployed or already deployed security protocols/ mechanisms.

I believe we have members on this forum who are experts in the security side of NFC and on the other hand also the members who are experts in using HPC Clusters for such Cryptanalysis. It would be nice to hear back from both sides about requirement and usefulness of Cryptanalysis in such application and information on how that can be achieved.

No Comments

Please note the views expressed in the comments below are that of the commenter and the owners of this website may not agree with the views expressed.

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

soccerine Wordpress Theme