Online Decision Process

Slides:



Advertisements
Similar presentations
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Advertisements

Card Verification Support
WHAT IS EMV? A joint effort between Europay, MasterCard and Visa It is a security framework that defines the payment interaction at the physical, electrical,
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CONFIDENTIAL AND PROPRIETARY ©2014 DISCOVER FINANCIAL SERVICES 2014 Discover ® Dealer Incentive Program & EMV Update.
Cryptography and Network Security
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards without the PIN 21st ACM Conference on Computer and Communications.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Credit Cards.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Chapter 8 Web Security.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Lecture 9 Micropayments I.
An Introduction to EMV Presented to:
PCI PIN Entry Device Security Requirements PCI PIN Security Standards
EMV: The Future is Now. Moderator: Jason Putnam Vice President of Sales, First American Payment Systems Panelists: Patty Walters Senior Vice President.
Secure Electronic Transaction (SET)
R U Ready? V M E EUROPAY MASTERCARD VISA EMVco was formed in 1999.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
E-PAYMENT METHODS 1. FACT OR FICTION ??? VISA processed 15,200 credit card transactions per minute. The first ATM machine was developed in 1939?. Luther.
Confidential – For Discussion & General Information Purposes Only EMV to Card Not Present Fraud Gavin Levin, CTP eReceivables Consultant.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
The next generation of payments is here. Is your business ready?
Cryptography, Authentication and Digital Signatures
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
TM MilliCent Scrip, Security and Secrets TM Dr. Mark S. Manasse DIGITAL Systems Research Center, Palo Alto
Chapter 21 Distributed System Security Copyright © 2008.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
draft-urien-tls-psk-emv-01
EMV: transforming the payment experience
11/18/2003 Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Summary of Changes. General These are changes that have come up in many EMV migrations that I have assessed and been involved in. The changes are broken.
Cryptography CSS 329 Lecture 13:SSL.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Presented by David Cole Changing the Card – Scripts.
Presented by David Cole
Presented by David Cole CVM Methods.  CVM Methods in the End-to-End Process  What is a CVM List?  Risk protection tool  Types of PIN processing 
Risk Policy Considerations.  Floor Limits  Fallback considerations  Domestic v International  Credit control (VSDC+) overview  Fraud reporting 
EMV.
Samsung Pay RAO Lu KONG Shuyi
Terminal Risk Management
Transaction Flow end-end
Cardholder Verification Method (CVM)
Make This Document Your Own
SECURITY FEATURES OF ATM
Problems – Technical Requirements
EMV® 3-D Secure - High Level Overview
Session 11 Other Assurance Services
U. S. Payments Landscape Perspective
Mastercard® Threat scan
Product Training Credit Cards
Electronic Payment Security Technologies
Presentation transcript:

Online Decision Process

Agenda Chip EMV End-to-End Process Online authentication processes Online PIN ATC DES cryptography principles CVV / iCVV Chip Online Card Authentication ARQC Chip issuer Authentication ARPC Host decisions – transaction data Stand In Processing (STIP) options Summary

Online authentication processes ISSUER HOST ONLINE – THE TERMINAL SENDS SPECIFIC VALUES TO HOST FOR VALIDATION. Online PIN Encrypted PIN reference value ATC checking Card generated incremental counter iCVV checking Chip card verification value stored in card Online CAM One-time only cryptographic value Generated by card secret DES key

Online authentication processes Traditional Fraud Method Traditional prevention Chip prevention (additional to traditional methods) Skimming (copying magnetic stripe) Nothing SDA or DDA or CDA Online CAM ATC checking Counterfeit CVV Physical Characteristics Lost and stolen / cards not received Activation processes Secure transportation Domestic online PIN Offline Plaintext PIN Offline Enciphered PIN Online PIN

Online authentication processes Fraud Type Traditional prevention Chip prevention (additional to traditional methods) Wire tapping None iCVV Chip Fraud Type (conceptual) Chip prevention Copying SDA Upgrade to DDA or CDA Online CAM Wedge attack – copying DDA Upgrade to CDA Copying iCVV Ensure online CAM Obtaining cardholder PIN None

Online PIN On-line PIN validation - use of PIN keys Uses existing process. No change with EMV LWK LWKà AWK AWKà IWK IWK Acquirer VisaNet Issuer LWK – Local Working Key AWK – Acquirer Working Key IWK – Issuer Working Key

Online ATC checking Card contains an internal counter called an Application Transaction Counter (ATC) This value increments by one every time the application is selected This value is sent in the authorisation to the Issuer Issuer can check this value against the previous value held on the host (from the previous online transaction) Expected - If transaction ATC is greater than the previous ATC (below a threshold) HOWEVER If transaction ATC is less than the previous ATC there maybe a problem If transaction ATC is greater than the previous ATC (above a threshold) there maybe a problem

DES cryptography principles Data Encryption Standard (DES) EMV uses double length algorithm. Also known as triple DES or 3DES Very good for privacy and data integrity Input data into a key and produce a value (cryptogram) Cryptogram can be validated with the same input repeated through the same key Two concepts used within payment processing One Master key used to create and validate Two keys used. One to create and One to validate

Card Verification Value - CVV ONE KEY CONCEPT SET-UP Account Number Service Code (101) Expiry Date Issuer Host System (Host Security Module) DES Key fwfoihbbever Unique Card Verification Value (CVV) PROCESS DES Key Recalculate The CVV value and compare fwfoihbbever Account Number Service Code Expiry Date fwfoihbbever

Card Verification Value - CVV ONE KEY CONCEPT If a fraudster ‘wire taps’ a line of a magnetic stripe transaction they will be able to copy the CVV value and generate counterfeit or skimmed cards If the same value was present in a chip transaction (CVV on the chip) the fraudster will still be able to extract the magnetic stripe data and use counterfeit / skimmed cards in a magnetic stripe (only) terminal How can we prevent ‘wire tapping’ of chip transactions?

ICC Card Verification Value - iCVV ONE KEY CONCEPT SET-UP Account Number Service Code Expiry Date (999) (201) Issuer Host System (Host Security Module) DES Key fwfuiygmjju Unique Card Verification Value (iCVV) DETECT THE FRADUSTER IN A MAG STRIPE TERMINAL DES Key Recalculate The CVV value and compare vaeroihqoi X Fail Account Number Service Code (201)(101) Expiry Date fwfuiygmjju 999 will not come online 201 will fail CVV 101 will fail CVV

ICC Card Verification Value - iCVV ONE KEY CONCEPT SET-UP Account Number Service Code Expiry Date (999) (201) Issuer Host System (Host Security Module) DES Key fwfuiygmjju Unique Card Verification Value (iCVV) PROCESS IN A CHIP TERMINAL DES Key Recalculate The iCVV value with (999) and compare fwfuiygmjju Account Number Service Code (201) Expiry Date fwfuiygmjju

Chip Online Card Authentication (ARQC/ARPC) TWO KEY CONCEPT SET-UP Account Number Sequence No: Issuer Host System (Host Security Module) MASTER UNIQUE CARD KEY DES Key DES Key

Chip Online Card Authentication (ARQC) TWO KEY CONCEPT PROCESS Recalculate The ARQC value and compare vairufheiuvaeirufgvergv 4 MASTER ARQC Authorisation ReQuest Cryptogram vairufheiuvaeirufgvergv 2 DES Key 3 UNIQUE CARD KEY DES Key 1 Amount Amount other Terminal Country code Unpredictable number Currency code Date Trans type TVR and CVR AIP ATC

Chip Issuer Authentication (ARPC) TWO KEY CONCEPT PROCESS 1 Create the ARPC value and send to card MASTER ARPC Authorisation ResPonse Cryptogram ruwyvbpasrihfvreuih 2 DES Key 3 ruwyvbpasrihfvreuih UNIQUE CARD KEY DES Key Amount Amount other Terminal Country code Unpredictable number Currency code Date Trans type TVR and CVR AIP ATC

Going Online Acquirer Affects It is important to understand that the Acquirer no longer controls the transaction. The Issuer EMV application controls it. The Acquirer has no access the PKI encryption or the DES encryption. The card has the last say in any transaction. If the ARPC returned does not check out the transaction is stopped by the card and declined. Any override by the merchant or acquirer makes them liable

STIP Stand-in Processing (STIP) can still operate But the entity standing in has to have access to the ARQC/ARPC DES keys and the Signed Static Data encoded on the card. Without these the ARQC cannot be decrypted and checked and the ARPC cannot be encrypted. If this happens the ARPC will fail in the card check and the transaction will be declined.