[email protected] (Hardee, Charles H) writes:
> I, too, don't see how they can be more secure.
> Possession is supposedly 9/10ths as the saying goes, but unless there's
> something bio-metric in the chip/card/human being relationship, I would
> have to say that the chips cards are no more, if not less, secure than
> the regular plastic we use today.

re:
http://www.garlic.com/~lynn/2010.html#71 Korean bank Moves back to Mainframes 
(...no, not back)
http://www.garlic.com/~lynn/2010.html#72 Korean bank Moves back to Mainframes 
(...no, not back)
http://www.garlic.com/~lynn/2010.html#73 Korean bank Moves back to Mainframes 
(...no, not back)
http://www.garlic.com/~lynn/2010.html#77 Korean bank Moves back to Mainframes 
(...no, not back)

as previously mentioned the "yes card" scenario for chipcard resulted in
bigger infrastructure vulnerability and more fraud than traditional
magstripe.

supposedly the chipcard was hard to counterfeit *AND* had two-factor
authentication (chip/plastic: "somthing you have" and PIN: "somthing you
know"). from three factor authentication model, misc. posts
http://www.garlic.com/~lynn/subintegrity.html#3factor

* something you have
* something you know
* something you are

the assumption that multiple factor authentication is more secure than
single factor is based on different authentication factors having
different vulnerabilities.

the problem with skimming (whether for the "yes card" or magstripe) ...
is it is possible to have a single compromise process (end-point
skimming compromise) ... invalidating the assumption about different
factors having different vulnerabilities.  In the case of multi-factor
authentication magstripe (plastic/magstripe & PIN) ... a compromised
end-point skims both the magstripe information and the PIN.

in the "yes card" scenario, a compromised end-point skims the
information used by terminals to establish a valid chipcard. the crooks
then install the skimmed information (similar to information skimmed for
counterfeit magstripe) in a counterfeit "yes card" chip.

once a terminal has accepted the chipcard's validation information, it
then asks the chipcard 1) whether the correct PIN has been entered (a
"yes card" always answers "YES" ... so it isn't necessary to even
know/skim the PIN), 2) whether the transaction should be offline
("YES"), and 3) whether the transaction is within the account credit
limit ("YES").

in counterfeit magstripe scenario, the account number is eventually
invalidated at the backend database (and future transactions are
rejected). In the counterfeit "YES CARD" scenario, the terminal doesn't
go online to find out about any account number invalidation. the greater
counterfeit "YES CARD" fraud is because infrastructure business rules
have been moved into the chipcard (infrastructure relying on the
chipcard to decide whether it is online/offline transaction and whether
the transaction is within the account's credit limit).

misc. past "yes card" posts
http://www.garlic.com/~lynn/subintegrity.html#yescard

one of the issues with "something you are" biometrics ... is that
nominally biometrics information is reduced to some sort of electronic
pattern for matching against value stored in backend database.  If that
value is compromised (analogous to "something you know" PIN/passwords)
... it is difficult to issue a new finger or iris. Frequently biometrics
are most dependable ... when they involve secure sensors/endpoints
... that possibly are under constant surveillance by armed guards.

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to