The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main as well.
[email protected] (J R) writes: > As Ted mentioned, Canadian banks use it. It is also used extensively > by European banks and those in the Antipodes. > > What do these banks have in common? They use all the traditional > EFT cryptography *plus* the additional functionality for EMV (SmartCards). > > Also, being inboard, IBM crypto is inherently more secure than attached > outboard offerings and benchmarks an order of magnitude faster. lots of fast crypto can also be leveraged to do a brute force attack ... the faster and the more secure the better. remember the "DES cracking" machine (I've a soviener chip from the machine in a box someplace) http://en.wikipedia.org/wiki/EFF_DES_cracker maybe 15-20 yrs ago ... a mainframe connected (internal financial/banking) desktop was compromised ... so that it would perform brute force attacks on PIN numbers ... effectively sending large number of "PINed" zero transactions to the mainframe ... until it found the correct values. 4 digit PINs ... 10k possible values ... on the avg, brute force finds the correct value after half the search space ... i.e. 5k attempts. High-performance mainframe becames a super PIN cracking machine. PIN'ed operations have some easier attacks: * a lot of debit cards now can be used in either PIN-debit mode or signature-debit mode ... attacker skims the magstripe information and creates counterfeit card for use in "signature-debit" mode (basically the same as credit card) * multi-factor authentication is nominal considered more secure assuming that the different factors have independent vulnerabilities ... aka PIN "something you know" authentication is considered countermeasure for lost/stolen ("something you have") card. lots of past posts mentioning 3-factor authentication paradigm http://www.garlic.com/~lynn/subintegrity.html#3factor Possibly two decades ago, slightly more sophisticated skimming technology started being used to record both the magstripe and the PIN ... at the same time; which invalidaties the assumption about independent vulnerabilities. Note that even with such vulnerabilities, signature-debit fraud numbers are 15 times higher than PIN-debit. part of this can be a lot of fraud is happening as a result of data breaches ... where only the magstripe information is readily available. some recent posts mentioning the breach hitting the news on tuesday ... and is shaping up to be the largest to-date: http://www.garlic.com/~lynn/2009b.html#6 US credit card payment house breached by sniffing malware http://www.garlic.com/~lynn/2009b.html#13 US credit card payment house breached by sniffing malware http://www.garlic.com/~lynn/2009b.html#19 US credit card payment house breached by sniffing malware * PINs are a form of "shared-secret" "something you have" authentication ... lots of past posts about shared-secret authentication http://www.garlic.com/~lynn/subintegrity.html#secret recent post comparing "shared-secret" and "public-key" http://www.garlic.com/~lynn/2009b.html#14 question about ssh-keygen with empty passphrase nominal security procedure for "shared-secrets" is to have a unique "shared-secret" for every unique security domain (in part as a countermeasure to x-domain attacks). 40yrs ago with only a couple such shared-secrets, it was relatively easy paradigm to deal with. roll forward 40 yrs ... and now it isn't unusual to have several scores of unique shared-secrets. Because of the human factors dealing with such large number of shared-secrets, some studies have found that 1/3rd of debit cards have the PIN written on them. The "shared-secret" paradigm for "something you know" authentication is not the only that is vulnerable to skimming, evesdropping, havesting, sniffing, and/or data breaches ... as already mentioned the information from "magstripes" ("something you have" authentication) is also vulnerable ... and can be used to create counterfeit cards. There is a case where a presumably well-designed chip-card was trivially vulnerable to similar (magstripe) skimming attack. The chip would present "static data" and then strong cryptography was used to verify that the information was valid. However, since the information was "static" ... it was trivial to skim the "valid data" and place it in a counterfeit chip-card. POS terminals would ask a (valid) chip-card three questions (after performing crypto validation of the static data): 1) was the correct PIN entered, 2) should the transaction be done offline, and 3) is the transaction within the account credit limit. The counterfeit chip-cards got the nickname "YES CARDS" ... since they would always answer "YES" to all three questions. reference to presentation on "yes cards" at cartes2002: http://web.archive.org/web/20030417083810/http://www.smartcard.co.uk/resources/articles/cartes2002.html and misc. past posts mentioning "yes cards": http://www.garlic.com/~lynn/subintegrity.html#yescard note that a valid chip-card required the correct PIN to be entered before performing a valid transaction. However, it wasn't necessary to even skim the PIN ... since a counterfeit "yes card", would always claim that the correct PIN was entered ... regardless of what was entered. there were sarcastic comments from some members of the industry that billions of dollars were spent to prove that chipcards are less secure than magstripe cards. there were some large scale deployments in the period ... that seem to just evaporate. -- 40+yrs virtualization experience (since Jan68), online at home since Mar70 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

