Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

Size: px
Start display at page:

Download "Payment systems. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2012"

Transcription

1 Payment systems Tuomas Aura T Information security technology Aalto University, autumn 2012

2 Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2

3 MONEY TRANSFER 3

4 Common payment systems Cash Electronic credit transfer, e-lasku Direct debit Check Credit card Cash transfer Mobile payment Anonymous payment Which are regulated? 4

5 Electronic credit transfer Also called bank transfer, wire transfer Payment process (e.g. UK CHAPS): Clearing: if the payment is between two banks, the sending bank sends the information to a central processor, which keeps track of payments Settlement: transfer of funds between the central-bank reserve accounts of the two banks at the end of the day for the balance of all transactions that day ( risk to central bank or receiving bank if a sending bank goes bust) Float: money between debit from the sender s bank account and credit to the receiver s account banks gain interest on float payments in some systems take days without any technical reason Finality varies for sender, banks and receiver Most electronic transfers immediately final to sender and bank, not receiver Old direct debit in Finland is final for sender; SEPA direct debit is reversible Sender Sending bank Central processor Receiving bank Receiver Timeline Sender makes payment Clearing float Settlement between banks Funds available to receiver 5

6 Check [classhelper.org] Check payment: 1. Payer writes the check 2. Clearing: payee deposits the check, bank collects payment, paying bank inspect the check for authenticity and sufficient funds 3. Settlement: transfer of funds between banks Float: in some countries, funds are available immediately after deposit, before clearing and settlement payee effectively gets an interest-free loan Timeline Payer writes check Payee deposits check Funds available to payee /negative) float Clearing Settlement between banks 6

7 Credit card Credit card issuer takes a ~2-5% transaction fee from seller Buyer protection: card issuer takes some of the risk Initial days of interest-free credit for buyer Kickbacks to some card holders Transaction final after 90 days clearer rules on finality than in bank transfer (one of the reasons why businesses like credit cards) Timeline Credit card purchase negative float Funds available to seller Buyer may pay balance Interest-free Transaction final 7

8 Cash transfers Western Union, MoneyGram: money transfer for people without bank accounts Sender pays cash at one branch office; receiver gets the cash at another branch office (no bank account needed) Used mostly by migrants to send money to 3rd-world countries Receiver must have id card or answer test question Example: NAME: MICHAEL SMITH ADDRESS: 144 EAST STREET LAGOS TEST QUESTION: WHAT IS THE DOGS NAME ANSWER: SPOT Hawala: informal network of agents based on Islamic law or honor system This and other informal systems conflict with money laundering legislation 8

9 Issues with float Victim receives a check or credit card details; ships goods before payment clears Timeline Scammer writes false check Victim deposits check Funds available to victim Victim ships goods Check found to be false or no funds deposit reversed Victim receives a check; funds available before the check clears; victim makes an irreversible payment (e.g. refunds all or part of the money) Timeline Scammer writes false check Victim deposits check Funds available to victim Check found to be false or no funds deposit reversed Victim returns (part of) the money Funds available to scammer 9

10 Issues with float Victim receives a reversible payment; victim makes an irreversible payment Timeline Criminal (e.g phisher) makes a money transfer to mule Funds available to mule Mule asked to repay Mule makes forward payment Funds available to scammer 10

11 Mobile payment Replacing banks in countries where branch network is sparse and carrying cash may be unsafe M-PESA in Kenya MTN Mobile Money in South Africa Implemented with SMS and SIM-Toolkit PIN and some kind of symmetric crypto Deposit and withdrawal at agent offices Money transfer and bill payment with phone SMS money transfer to unregistered users Anyone can just start using the service; some limits relaxed after strong authentication with id card Similar services in India Discontinued Nokia Money: app on phone, not on SIM 11

12 PayPal Payment between registered accounts on central server Used for Internet purchases especially on auction web sites Depends on credit cards and banks accounts for deposit and withdrawal Payer and payee can remain pseudonymous Stronger traceability of verified accounts Links user to a bank account 12

13 CARD PAYMENT 13

14 Mag-stripe bank cards Magnetic stripe contains primary account number (PAN), name, expiration date, service code, PVKI, PVV, CVV1 Signature and (sometimes) photo id required at point of sale (POS) PIN required by automated teller machines (ATM) and some POS PIN is a function of data on mag stripe and key in terminal offline PIN verification at disconnected POS or ATM Possible to copy data on the mag stripe CVV1 is a cryptographic MAC of the PAN, name, expiration and service code (based on 3DES) Offline terminal has a security module to store the card and PIN verification keys CVV2 to make online fraud harder 3-4 digits printed on card but not on mag stripe Required for web and phone ( card not present ) transactions Not stored by merchant after online verification safe from server hacking Vulnerable to phishing 15

15 Mag-stripe Visa PIN verification Input from magnetic stripe: Primary account number (PAN) i.e. 15-digit card number PIN verification key indicator (PVKI, one digit 1..6) PIN verification value (PVV, 4 decimal characters) Verifier must have PIN verification key (PVK, 128-bit 3DES key) PVKI is an index for PVK to enable PVK changes Create security parameter (TSP): 1. Concatenate 11 rightmost digits of PAN, PVKI and PIN 2. The 16-digit concatenation is one hexadecimal DES block PVV generation: 1. 3DES encryption of TSP with the key PVK 2. Decimalization of the encryption result to 4-digit PVV Decimalization happens by taking the 4 leftmost digits 0..9 from the hexadecimal encrypted block If less than 4 such digits, take 4 first digits A..F and map A=0,B=1,C=3... [For details see IBM] 16

16 Chip-and-PIN bank cards EMV standard (Europay, Mastercard, Visa) Smartcard chip (ICC) on the bank card Tamperproof ICC stodes a cryptographic signature key Card also contains a certificate Three levels of secure transactions: 1. Static data authentication (SDA): Certificate verification only; no longer used in Finland 2. Dynamic data authentication (DDA): Card signs a random challenge sent by terminal 3. Combined DDA and application cryptogram (CDA): Card signs transaction details incl. random challenge Card holder authenticated with PIN or signature PIN usually sent to the card, which answers yes/no 17

17 EMV security issues Not possible to copy the chip Mag stripe can still be copied Possible to create a copy of the mag stripe: use in the USA or as the fallback method after chip failure Mag stripe data can also be read from the chip PIN used frequently easier to capture 18

18 ANONYMOUS PAYMENTS 19

19 Anonymous digital cash David Chaum 1982, later DigiCash product never really used but an influential idea Participants: bank, buyer Alice, merchant Bob Alice buyer 1. Bank issues coin Bank 2. Alice spends coin 3. Bob deposits coin Bob merchant Anonymous: Bank cannot link issued and deposited coins, not even with Bob s help Not transferable: must be deposited to bank after one use Uses blind signatures: bank signs coins without seeing their contents cannot link events of coin issuing and use 20

20 Anonymous digital cash Idea 1: blind signature: Bank has an RSA signature key pair key (e,d,n) for signing 1 coins (and different keys for 10, 100,...) 1. Alice creates a coin from random serial number SN and redundant padding required for RSA signature; Alice generates a random number R, computes coin R e mod n, and sends this to the bank 2. Bank computes (coin R e ) d mod n = coin d R mod n and sends this to Alice 3. Alice divides with R to get the signed coin coin d mod n Bank has signed the coin without seeing it and cannot link the coin to Alice Alice can pay 1 to Bob by giving him the coin Bob deposits coin to bank; bank checks signature and only accepts the same coin once Problem: Cheaters are anonymous; if someone pays the same coin to two merchants, who was it? 21

21 Anonymous digital cash Idea 2: double-spending detection Alice must set SN = h( h(n) h(n xor Alice ) ) where N random After Alice has given the coin to Bob, Bob asks Alice to reveal one of h(n),n xor Alice or N,h(N xor Alice ) If Alice spends the coin twice, she reveals her name with 50% probability Make each 1 coin of k separately signed subcoins detection probability p = 1-2 -k Coins will be quite large: k=128 with 2048-bit RSA signatures makes 32kB/coin Problem: What forces Alice to create SN this way? How can bank check the contents of the message signed blindly? 22

22 Anonymous digital cash Idea 3: cut and choose Alice creates k pairs of sub-coins for signing Bank asks Alice to reveal N for one sub-coin in each pair and signs the other one cheating detection probability p = 1-2 -k Alice can make anonymous payments but will be caught with probability p = 1-2 -k if she tries to create an invalid coin or spend the same coin twice 23

23 Reading material Ross Anderson: Security Engineering, 2nd ed., chapter 10 Interesting reading online: Scam baiting sites have stories about advance-fee fraud (e.g. but not always nice University of Cambridge Security Group: ng/ 24

24 Exercises What are the main threats in a) online card transactions? b) POS transactions? c) ATM cash withdrawals? What differences are there in the way credit cards and bank debit cards address these threats? Could you (technically) use bank cards or credit cards a) as door keys? b) as bus tickets? c) for strong identification of persons on the Internet? How could a malicious merchant perform a man-in-the-middle attack against chipand-pin transactions? When a fraudulent bank transaction occurs, who will suffer the losses? Find out about the regulation and contractual rules on such liability. Bank security is largely based on anomaly detection and risk mitigation. In what ways could a bank reduce the risk of fraud in mag-stipe or chip-and-pin payments? Even though DigiCash coins are unlinkable, what ways are there for the merchant or bank (or them together) to find out what Alice buys? 25

Payment systems. Tuomas Aura T-110.4206 Information security technology

Payment systems. Tuomas Aura T-110.4206 Information security technology Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card

More information

2015-11-02. Electronic Payments Part 1

2015-11-02. Electronic Payments Part 1 Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced

More information

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015 Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment

More information

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV: Integrated Circuit Card Specifications for Payment Systems : Integrated Circuit Card Specifications for Payment Systems Jan Krhovják Faculty of Informatics, Masaryk University Jan Krhovják (FI MU) EMV (Europay, MasterCard, Visa) 20. 3. 2006 1 / 13 Outline EMV

More information

Formal analysis of EMV

Formal analysis of EMV Formal analysis of EMV Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview The EMV standard Known issues with EMV Formalisation of the EMV standard in F# Formal analysis

More information

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

M/Chip Functional Architecture for Debit and Credit

M/Chip Functional Architecture for Debit and Credit M/Chip Functional Architecture for Debit and Credit Christian Delporte, Vice President, Chip Centre of Excellence, New Products Engineering Suggested routing: Authorization, Chargeback, Chip Technology,

More information

Chip and PIN is Broken a view to card payment infrastructure and security

Chip and PIN is Broken a view to card payment infrastructure and security Date of Acceptance Grade Instructor Chip and PIN is Broken a view to card payment infrastructure and security Petri Aaltonen Helsinki 16.3.2011 Seminar Report Security Testing UNIVERSITY OF HELSINKI Department

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

Smart Cards for Payment Systems

Smart Cards for Payment Systems White Paper Smart Cards for Payment Systems An Introductory Paper describing how Thales e-security can help banks migrate to Smart Card Technology Background In this paper: Background 1 The Solution 2

More information

Electronic Cash Payment Protocols and Systems

Electronic Cash Payment Protocols and Systems Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

CardControl. Credit Card Processing 101. Overview. Contents

CardControl. Credit Card Processing 101. Overview. Contents CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old

More information

The Canadian Migration to EMV. Prepared By:

The Canadian Migration to EMV. Prepared By: The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced

More information

Electronic Payments. EITN40 - Advanced Web Security

Electronic Payments. EITN40 - Advanced Web Security Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin

More information

Relay attacks on card payment: vulnerabilities and defences

Relay attacks on card payment: vulnerabilities and defences Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,

More information

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org

More information

Secure Payment Architecture

Secure Payment Architecture 1 / 37 Secure Payment Architecture Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ work with Saar Drimer, Ross Anderson, Mike Bond Computer Laboratory SecAppDev, February 2014, Leuven, BE 2 / 37

More information

How To Protect A Smart Card From Being Hacked

How To Protect A Smart Card From Being Hacked Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response

More information

Credit card: permits consumers to purchase items while deferring payment

Credit card: permits consumers to purchase items while deferring payment General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily

More information

PayPass M/Chip Requirements. 10 April 2014

PayPass M/Chip Requirements. 10 April 2014 PayPass M/Chip Requirements 10 April 2014 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online.

More information

Prevention Is Better Than Cure EMV and PCI

Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,

More information

EMV: A to Z (Terms and Definitions)

EMV: A to Z (Terms and Definitions) EMV: A to Z (Terms and Definitions) First Data participates in many industry forums, including the EMV Migration Forum (EMF). The EMF is a cross-industry body focused on supporting an alignment of the

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

DEBIT and CREDIT CARDS

DEBIT and CREDIT CARDS 1. What is a credit card and how it differs from a debit card? A payment card is a piece of plastic containing essential banking information about the holder authorizing him to pay for goods and services

More information

How Secure are Contactless Payment Systems?

How Secure are Contactless Payment Systems? SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2

More information

CREDIT CARD PROCESSING GLOSSARY OF TERMS

CREDIT CARD PROCESSING GLOSSARY OF TERMS CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.

More information

Acquirer Device Validation Toolkit (ADVT)

Acquirer Device Validation Toolkit (ADVT) Acquirer Device Validation Toolkit (ADVT) Frequently Asked Questions (FAQs) Version: 2.0 January 2007 This document provides users of Visa s Acquirer Device Validation Toolkit (ADVT) with answers to some

More information

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed

More information

EMV : Frequently Asked Questions for Merchants

EMV : Frequently Asked Questions for Merchants EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited

More information

Preparing for EMV chip card acceptance

Preparing for EMV chip card acceptance Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June

More information

Visa Recommended Practices for EMV Chip Implementation in the U.S.

Visa Recommended Practices for EMV Chip Implementation in the U.S. CHIP ADVISORY #20, UPDATED JULY 11, 2012 Visa Recommended Practices for EMV Chip Implementation in the U.S. Summary As issuers, acquirers, merchants, processors and vendors plan and begin programs to adopt

More information

EMV and Restaurants What you need to know! November 19, 2014

EMV and Restaurants What you need to know! November 19, 2014 EMV and Restaurants What you need to know! Mike English Executive Director of Product Development Kristi Kuehn Sr. Director, Compliance November 9, 204 Agenda EMV overview Timelines Chip Card Liability

More information

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names

More information

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,

More information

Formal models of bank cards for free

Formal models of bank cards for free Formal models of bank cards for free Fides Aarts, Joeri de Ruiter and Erik Poll Digital Security, Radboud University Nijmegen Introduction Active learning on bank cards Learn state machines of implementations

More information

NEWS BULLETIN 2015-16

NEWS BULLETIN 2015-16 NEWS BULLETIN Maine Automobile Dealers Association 180 Civic Center Drive P. O. Box 2667 Augusta, Maine 04338-2667 DIAL 623-3882 e-mail:info@maineautodealers.com FAX 623-2318 DISTRIBUTION General Manager

More information

EMV EMV TABLE OF CONTENTS

EMV EMV TABLE OF CONTENTS 2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.

More information

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks.

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks. Digital Cash is not a check, credit card or a debit card. They leave audit trails. is anonymous and untraceable. can be sent through computer networks. can be used off-line (not connected to a bank). is

More information

JCB Terminal Requirements

JCB Terminal Requirements Version 1.0 April, 2008 2008 JCB International Co., Ltd. All rights reserved. All rights regarding this documentation are reserved by JCB Co., Ltd. ( JCB ). This documentation contains confidential and

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

EMV Frequently Asked Questions for Merchants May, 2014

EMV Frequently Asked Questions for Merchants May, 2014 EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,

More information

EMV Acquiring at the ATM: Early Planning for Credit Unions

EMV Acquiring at the ATM: Early Planning for Credit Unions EMV Acquiring at the ATM: Early Planning for Credit Unions EMV Adoption Recent data breaches and planned Network Liability shifts have increased the interest in EMV at the ATM and have affected the planned

More information

Chip & PIN notes on a dysfunctional security system

Chip & PIN notes on a dysfunctional security system Chip & PIN notes on a dysfunctional security system Saar Drimer http://www.cl.cam.ac.uk/~sd410/ Computer Laboratory in collaboration with Steven J. Murdoch, Ross Anderson, Mike Bond The Institution of

More information

Payments Industry Glossary

Payments Industry Glossary Payments Industry Glossary 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective owners. A ACH: Automated Clearing

More information

Why Cryptosystems Fail. By Ahmed HajYasien

Why Cryptosystems Fail. By Ahmed HajYasien Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.

More information

EFTPOS Merchant Facilities Quick Reference Guide

EFTPOS Merchant Facilities Quick Reference Guide EFTPOS Merchant Facilities Quick Reference Guide How to Use this Guide This handy Quick Reference Guide has been designed to give you step-by-step, easy-to-follow instructions on how to correctly use your

More information

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 Fundamentals of EMV Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 EMV Fundamentals Transaction Processing Comparison Magnetic Stripe vs. EMV Transaction Security

More information

Pima Federal Visa Credit Cards Frequently Asked Questions (FAQs)

Pima Federal Visa Credit Cards Frequently Asked Questions (FAQs) Pima Federal Visa Credit Cards Frequently Asked Questions (FAQs) (Effective May 2013) APPLICATION PROCESS Q: Who can apply for a Pima Federal Visa Credit Card? A: Any member of Pima Federal is eligible

More information

Using EMV Cards to Protect E-commerce Transactions

Using EMV Cards to Protect E-commerce Transactions Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

TOP TRUMPS Comparisons of how to pay for goods and services online

TOP TRUMPS Comparisons of how to pay for goods and services online Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face

More information

Banking in the United States of America

Banking in the United States of America Banking in the United States of America U.S. Banking System Overview Banking is regulated by Federal and State governments. Privacy Disclosure Fraud protection Protection against dishonest lending Lending

More information

welcome to liber8:payment

welcome to liber8:payment liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience

More information

Securing the Payments System. The facts about fraud prevention

Securing the Payments System. The facts about fraud prevention Securing the Payments System The facts about fraud prevention Contents Introduction 3 Visa s Security Programme 4 Fraud Types and Threats 6 Fraud Statistics and Research 7 Visa s Security Agenda for New

More information

DIAMOND NAIRA VISA DEBIT CARD. Your Bank

DIAMOND NAIRA VISA DEBIT CARD. Your Bank DIAMOND NAIRA VISA DEBIT CARD Your Bank Overview The Diamond Naira Visa Debit Card is an international payment card issued by Diamond Bank in partnership with the VISA Card Association. It is denominated

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1 The most significant trend is decreasing paper payments and increasing electronic payments. Many organizations are also seeing

More information

Practically Thinking: What Small Merchants Should Know about EMV

Practically Thinking: What Small Merchants Should Know about EMV Practically Thinking: What Small Merchants Should Know about EMV 1 Practically Thinking: What Small Merchants Should Know About EMV Overview Savvy business owners know that payments are about more than

More information

FAQ on EMV Chip Debit Card and Online Usage

FAQ on EMV Chip Debit Card and Online Usage FAQ on EMV Chip Debit Card and Online Usage Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology? You can

More information

Redwood Merchant Services. Merchant Processing Terminology

Redwood Merchant Services. Merchant Processing Terminology ACH - Automated Clearing House for member banks to process electronic payments or withdrawals. (Credits or debits to a bank account) through the Federal Reserve Bank. Acquiring Bank - Licensed Visa/MasterCard

More information

Read this first. Copyright

Read this first. Copyright Next Generation Banking system Cloud Banking Brochure Mobile Banking Service Provider Read this first Thank you for your interest in MBSP (Mobile Banking Service provider) Cloud Core Banking products.

More information

Guideline on Debit or Credit Cards Usage

Guideline on Debit or Credit Cards Usage CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius

More information

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia) CONTACTLESS PAYMENTS Joeri de Ruiter University of Birmingham (some slides borrowed from Tom Chothia) Overview EMV Protocol Attacks EMV-Contactless Protocols Attacks Demo Stopping relay attacks What is

More information

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All

More information

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06 MasterCard PayPass M/Chip, Acquirer Implementation Requirements v.1-a4 6/06 TABLE OF CONTENTS 1 USING THESE REQUIREMENTS...4 1.1 Purpose...4 1.2 Scope...4 1.3 Audience...5 1.4 Overview...5 1.5 Language

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

COLUMBIA CREDIT UNION ELECTRONIC FUNDS TRANSFERS AGREEMENT AND DISCLOSURE Business Accounts

COLUMBIA CREDIT UNION ELECTRONIC FUNDS TRANSFERS AGREEMENT AND DISCLOSURE Business Accounts COLUMBIA CREDIT UNION ELECTRONIC FUNDS TRANSFERS AGREEMENT AND DISCLOSURE Business Accounts This Agreement is the contract that covers your and our rights and responsibilities concerning Electronic Fund

More information

Frequently Asked Questions

Frequently Asked Questions PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply

More information

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015 PCI compliance: v3.1 Key Considerations Corbin Del Carlo Director, National Leader PCI Services October 5, 2015 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice

More information

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc. Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance

More information

Basic Banking. 2) Money that a bank allows you to borrow and pay back with interest

Basic Banking. 2) Money that a bank allows you to borrow and pay back with interest Basic Banking When choosing a bank, you should look for a bank that offers the type of accounts and services you are looking for. You might look for convenience of branch locations, great customer service,

More information

Mobile and Contactless Payment Security

Mobile and Contactless Payment Security Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.

More information

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic

More information

How Smartcard Payment Systems Fail. Ross Anderson Cambridge

How Smartcard Payment Systems Fail. Ross Anderson Cambridge How Smartcard Payment Systems Fail Ross Anderson Cambridge The EMV protocol suite Named for Europay- MasterCard- Visa; also known as chip and PIN Developed late 1990s; deployed in UK ten years ago (2003

More information

Consumer FAQs. 1. Who is behind the BuySafe initiative? 2. Why should I use a PIN? 3. Do all transactions need a PIN?

Consumer FAQs. 1. Who is behind the BuySafe initiative? 2. Why should I use a PIN? 3. Do all transactions need a PIN? Consumer FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including all of the

More information

Date Here. Welcome to DePaul University s New International Students 2015!

Date Here. Welcome to DePaul University s New International Students 2015! Date Here Welcome to DePaul University s New International Students 2015! U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection

More information

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 The EMV Readiness Collis America Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools

More information

EMV PAYMENT TERMINAL SYSTEM FUNCTIONAL DESCRIPTION 21 October 2011 / V 4.2

EMV PAYMENT TERMINAL SYSTEM FUNCTIONAL DESCRIPTION 21 October 2011 / V 4.2 1(19) table of contents 1. Introduction... 2 2. Definitions... 3 3. Payment terminal system... 6 4. Agreements and accepted cards... 6 5. Identifying cards and verifying their authenticity... 7 6. Purchases

More information

White Paper. EMV Key Management Explained

White Paper. EMV Key Management Explained White Paper EMV Key Management Explained Introduction This white paper strides to provide an overview of key management related to migration from magnetic stripe to chip in the payment card industry. The

More information

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase

More information

Be*PINWISE Cardholder FAQs

Be*PINWISE Cardholder FAQs Be*PINWISE Cardholder FAQs 1. Who is behind the BuySafe initiative? The Industry Security Initiative (ISI)/BuySafe initiative comprises representatives of ten Australian financial institutions including

More information

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015 Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular

More information

Guidelines for Card Issuance and Usage in Nigeria

Guidelines for Card Issuance and Usage in Nigeria CENTRAL BANK OF NIGERIA Guidelines for Card Issuance and Usage in Nigeria Ver. 2 GUIDELINES FOR CARD ISSUANCE AND USAGE IN NIGERIA SECTIONS/TA BLE OF CONTENTS 1.0 Preambles 3 2.0 Minimum Standards 3 3.0

More information

The fraudsters, phishers, hackers, and pickpockets who thrive

The fraudsters, phishers, hackers, and pickpockets who thrive The U.S. Adoption of Computer-Chip Payment Cards: Implications for Payment Fraud By Richard J. Sullivan The fraudsters, phishers, hackers, and pickpockets who thrive off payment card fraud may soon have

More information

How To Get A Checking Account In The United States

How To Get A Checking Account In The United States Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against

More information

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 The guide describes how you can make sure your business does not store sensitive cardholder data Contents 1 Contents

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

Office of Finance and Treasury

Office of Finance and Treasury Office of Finance and Treasury How to Accept & Process Credit and Debit Card Transactions Procedure Related Policy Title Credit Card Processing Policy For University Merchant Locations Responsible Executive

More information

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security

More information

Security enhancement on HSBC India Debit Card

Security enhancement on HSBC India Debit Card Security enhancement on HSBC India Debit Card A Secure Debit Card HSBC India Debit Cards are more secure and enabled with the Chip and PIN technology. In addition to this you can restrict usage of the

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD Ramesh Javvaji 1, Roopa Goje 2, Praveen Pappula 3 Assistant professor, Computer Science & Engineering, SR Engineering College, Warangal,

More information

What is EMV? What is different?

What is EMV? What is different? U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,

More information

PCI and EMV Compliance Checkup

PCI and EMV Compliance Checkup PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations

More information

Banking Security Architecture

Banking Security Architecture Banking Security Architecture Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ work with Saar Drimer, Ross Anderson, Mike Bond Computer Laboratory www.torproject.org SecAppDev, March 2012, Leuven,

More information