Title: Agenda
1Agenda
- Parts that need to be secured
- Card authentication
- Key management
2Security with Smart-cards
- Avoid use of fake cards for off-line transactions
- Detect use of skimmed cards in on-line
transaction - Secure sensitive data sent to the card from the
issuer
3Parts That Need to Be Secured
- Card terminal authentication
- Card issuer interaction
- Scripts sent to card by issuer
4Card Terminal Authentication
- The issuer has a certificate signed by the
payment net (VISA, Europay or MasterCard) - The payment net acts as CA (Certificate
Authority) - The issuer signs its card with its private key
and puts the signature on the card - The issuers public key certificate is placed on
the card - The terminal knows the root (CA) certificate
- Using the root certificate, the terminal can
verify the signature presented by the card is
valid.
5Overview of Keys Used
6Static Data Authentication (SDA)
- Each card is equipped with a signature on
important card data. - No secret key on card.
- Data signed include card number, expiration data,
verification methods etc. - The signed data is sent to the terminal when
transaction is started. - Same data and signature used every time
(therefore static).
7Signed Static Application Data, Generation
Hashed valued
Encrypt with issuer private key
Signed Static Application Data
8Signed Static Application Data, Verification
Signed Static Application Data
Decrypt with issuer public key
9Dynamic Data Authentication (DDA)
- Each card is equipped with a private key and a
public key. - The public key is in a public key certificate
signed by the issuer. - At transaction time, the card signs random data
with its private key. - The terminal checks the signature and verifies
the certficate chain. - Different data used every time (therefore
dynamic).
10Dynamic Data Authentication
11Comparison SDA vs. DDA
12Card Issuer Authentication
- Issuer needs a permanent proof that the
transaction has taken place. - Protection against fraud that comes from the
merchant. - Based on symmetric cryptography
- Issuer places a key on the card at issuing.
- Issuer keeps the same key for use in
authorization processing.
13Overview of Keys Used
Sent during transaction
14Application Cryptograms
- In every request to the issuer, the cards
computes a MAC over certain parameters. - This MAC is called application cryptogram.
- The exact algorithm is defined between the issuer
and the card.
15Issuer Authentication and Secure Messaging
- If the issuer sends a MAC in the response, the
card can verify that the message originates at
the issuer. - When secure messaging is used, data sent from the
issuer to the card is authenticated and/or
encrypted. - Necessary for script processing
- Change of risk parameters requires the messages
to be secured with a MAC. - Change of PIN requires the new PIN to be
enciphered.
16Computing Application Cryptograms
Application cryptogram (8 bytes)
MAC computation with card key
17Computing Response Cryptogram (ARPC)
XOR last two bytes with the response from issuer
Encrypt with card key
Application Response Cryptogram (ARPC,8 bytes)
Application cryptogram (8 bytes)
18Key Derivation
- Each key to be put on the card is derived from an
issuer master key. - An issuer has (at least) one master key for each
key type to be placed on the card. - The derivation process is performed by taking
card data and encrypt it with the corresponding
master key. - The card information used is PAN (i.e., card
number) and sequence number.
Card information
Encryption
Issuer master key
Unique card key
19Session Keys
Session information
- For security reasons it is often a good idea to
use different keys for each transaction. - Keys used only for one transaction are called
session keys.
Encryption
Unique card key
Session key
20Deriving Session Keys
- Session keys are derived from the card key and
session information. - The session information can be the transaction
counter, ATC, or some other information sent in
the transaction. - The data used for session key generation must be
available to the issuer to allow the issuer to
create the same key. - Transaction counter is sent in clear.
- Other data used for key generation must be
availablethrough other means.
21Summary
- Smart-cards protects the merchant, issuer and
card-holder against fraud from counterfeited
cards and fake transactions. - For card terminal authentication different
levels of security is possible, e.g., SDA vs.
DDA. - Card issuer authentication gives an electronic
seal on transaction data.