Mobile and Contactless Payment Security



Similar documents
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Using RFID Techniques for a Universal Identification Device

JCB Terminal Requirements

EMV: A to Z (Terms and Definitions)

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

What standards ISO/CEI ISO/CEI EPC class 1 gen 2. RFID standards. ISO14443,ISO15693 and EPCGlobal. Mate SoosINRIA.

RFID Penetration Tests when the truth is stranger than fiction

Gemalto Mifare 1K Datasheet

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors

Mitigating Fraud Risk Through Card Data Verification

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)

What is a Smart Card?

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT Hackito Ergo Sum 2012 April 12,13,14 Paris, France

NACCU Migrating to Contactless:

EMV 96 Integrated Circuit Card Terminal Specification for Payment Systems

What Merchants Need to Know About EMV

Chip Card & Security ICs Mifare NRG SLE 66R35

Smart Cards for Payment Systems

Beyond Cards and Terminals: Considerations for Testing Host-to-Host EMV Processing

How To Protect A Smart Card From Being Hacked

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

PayPass M/Chip Requirements. 10 April 2014

Crash and Pay: Owning and Cloning Payment Devices

Payment systems. Tuomas Aura T Information security technology

Using EMV Cards to Protect E-commerce Transactions

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Securing Mobile Payment Protocol. based on EMV Standard

Guide to Data Field Encryption

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

PayPass - M/Chip Requirements. 5 December 2011

Credit Card Processing Overview

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

White Paper. EMV Key Management Explained

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

EMV (Chip-and-PIN) Protocol

A Guide to EMV Version 1.0 May 2011

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

MIFARE ISO/IEC PICC

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06

CardControl. Credit Card Processing 101. Overview. Contents

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

a leap ahead in analog

Electronic Payments Part 1

The EMV Readiness. Collis America. Guy Berg President, Collis America

How To Secure A Paypass Card From Being Hacked By A Hacker

Security & Chip Card ICs SLE 44R35S / Mifare

Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

Using ISO Compliant RFID Tags in an Inventory Control System

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Side-Channel Monitoring of Contactless Java Cards

Acquirer Device Validation Toolkit (ADVT)

EMVCo Letter of Approval - Contact Terminal Level 2

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Smart Card Technology Capabilities

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

Exercise 1: Set up the Environment

ETSI TS V1.2.1 ( )

Visa Recommended Practices for EMV Chip Implementation in the U.S.

EMV and Restaurants What you need to know! November 19, 2014

Localization System for Roulette and other Table Games

Obsolete Product(s) - Obsolete Product(s)

EMV Frequently Asked Questions for Merchants May, 2014

MF1 IC S General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

EMV : Frequently Asked Questions for Merchants

Requirements for an EMVCo Common Contactless Application (CCA)

NFC. Technical Overview. Release r05

implementing American Express EMV acceptance on a Terminal

Formal Analysis of the EMV Protocol Suite

SL2 ICS53/SL2 ICS General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

M/Chip Functional Architecture for Debit and Credit

Extending EMV payment smart cards with biometric on-card verification

Radio Frequency Identification (RFID)

EMV-TT. Now available on Android. White Paper by

READER COMPONENTS. mifare (14443A) MHz RFID Proximity Antennas. November Revision 1.0 PUBLIC. Philips Semiconductors

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Mobile Near-Field Communications (NFC) Payments

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Entrust Smartcard & USB Authentication

Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket

Side Channel Analysis and Embedded Systems Impact and Countermeasures

The Canadian Migration to EMV. Prepared By:

A typical 3D Secure transaction using TrustMarque s hosted MPI

Bringing Mobile Payments to Market for an International Retailer

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Acceptance to Minimize Fraud

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Risks of Offline Verify PIN on Contactless Cards

AN Software Design Guide for POS Development Kit OM5597/RD2663. Rev August Application note COMPANY PUBLIC

Card Technology Choices for U.S. Issuers An EMV White Paper

Transcription:

Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph. +34 93 184 2788 Peter Fillmore Email: lab@withamlabs.com Slide No. 1

Topics covered in this talk How it works Card Standards EMV/Contactless Basics CVV Explanation Static Data Authentication Combined Dynamic Data Authentication Recent Advances Future areas of research Slide No. 2

How Contactless/NFC/RFID Cards Work Slide No. 3

How NFC/RFID/Contactless Works Electromagnetic induction. Antennas are present in the terminal and the card. The terminal generates a 13.56 MHz carrier signal. This signal powers the card and carries the data. The modulation used to transmit data varies according to the type of card. Slide No. 4

What a card is made of: Cards contain an near-field antenna embedded in the card plastic. A SoC is present in the upper left of the card which connects to the antenna in the card. Slide No. 5

Types of Cards and Standards ID-1 Card ISO 7810 Smart Cards ISO 7816 Contactless Smart Cards Contact Cards CICC Contactless IC Cards ISO 10536 PICC Proximity IC Cards ISO 14443 Contactless Cards VICC Vicinity IC Cards ISO 15693 RICC Remote IC Cards Memory Card Processor Card Processor Card Memory Card 13.56 MHz Processor Card 13.56 MHz Memory Card 13.56 MHz Memory Card(battery) 2.4/5.8 GHz Dual Interface Cards Slide No. 6

The ISO14443 Standard Part 1: Physical Characteristics Part 2: Radio frequency power and signal interface Part 3: Initialization and anticollision Part 4: Transmission Protocol Slide No. 7

Two Types of Card Terminal To Card Type A Type B Modulation ASK 100% ASK 10% Bit Coding Modified Miller Code NRZ-L Synchronization Card To Terminal Bit Level(SOF and EOF) Type A 1 start and 1 stop bit per byte Type B Modulation Load modulation with subcarrier 847kHz, ASK. Bit Coding Manchester Code NRZ-L Load modulation with subcarrier 847kHz, BPSK. Synchronization 1 bit frame sync(sof, EOF) 1 start and 1 stop bit per byte Slide No. 8

ISO14443-A Terminal To Card (Modified Miller, 100% ASK) Sequence X Logical 1 Sequence Y Logical 0 Sequence Z Logical 0 Card To Terminal (Manchester, subcarrier ASK modulated) Sequence D Logical 1 Sequence E Logical 0 Slide No. 9

ISO14443-B Terminal To Card Communications (NRZ-L, 10% ASK) Logical 0 Logical 1 Card To Terminal Communications (NRZ-L, BPSK modulated subcarrier) Logical 1 Phase = 0 degrees Slide No. 10 Logical 0 Phase = 180 degrees

Anti-Collision What is it? Does it matter? Slide No. 11

EMV and Contactless EMV = Chip Card standard Defines use of cards in financial settings Same commands and functions are used in NFC payment cards BER-TLV encoding is used for data Slide No. 12

What is on these Cards? Slide No. 13

Track 1 Explained Card Data: PAN: 5412 7512 3412 3456 Card Holder Name: MR JOHN A. CITIZEN Expiration Date: 01/15 Service Code: 101(International Card, Normal Authorization, Normal Verificiation) % B 5 4 1 2 7 5 1 2 3 4 1 2 3 4 5 6 ^ C I T I Z E N / J O H N A. M R ^ 1 5 0 1 1 0 1 * * *? Start Sentinel Name Format Code Expiry Date Discretionary Data LRC PAN Service Code End Sentinel Slide No. 14

Track 2 Explained Card Data: PAN: 5412 7512 3412 3456 Card Holder Name: MR JOHN A. CITIZEN Expiration Date: 01/15 Service Code: 101(International Card, Normal Authorization, Normal Verificiation) ; 5 4 1 2 7 5 1 2 3 4 1 2 3 4 5 6 = 1 5 0 1 1 0 1 * * *? Start Sentinel Expiry Date Discretionary Data LRC PAN Service Code End Sentinel Slide No. 15

Discretionary Data * * * Discretionary Data This is an optional field for storage of issuer data etc. Is used to store PVKI, PVV, CVV, CVC PVKI/PVV is used for PIN verification by the issuer CVV/CVC is used to verify the track data on the card. Slide No. 16

What keys are on a typical payment card? Key Name Description KD CVC3 MK AC SK AC ICC Derived Key for CVC3 Generation ICC Application Cryptogram Master Key ICC Application Cryptogram Session Key Symmetric Key used for generating the CVC3 Symmetric Key used to derive the session key for generation of the Application Cryptogram Symmetric Key used to generate the Application Cryptogram Slide No. 17

What keys are on a typical card? Key Name Description Pi Issuer Public Key Used to verify signature on static card data. S IC ICC Private Key Generates signature on dynamic data P IC ICC Public Key Used by Terminal for verification of cards signature on dynamic data Slide No. 18

Card Verification Values Explained Many types: CVV/CVC,CVV2/CVC2,iCVV3 CVV/CVC verifies the track data has not been changed on the magnetic stripe However CVV/CVC is a fixed value located with the track data and is read every time your card is swiped Slide No. 19

Card Verification Values Explained CVV2/CVC2 is printed on the card, and not in the discretionary data on the track. Most familiar in CNP transactions Card Not Present i.e Over the phone or Internet purchases use this. However CVV2/CVC2 is also a fixed value printed on the card Slide No. 20

Dynamic Card Verification Code 3 How does a contactless payment card avoid these issues? A dynamic value generated for each transaction Allows for Contactless cards to be used in older Magnetic Stripe environments However. This can be set to a static value by the issuer Slide No. 21

Calculation of the Dynamic CVC(CVC3) Concatenate to form 8 byte data block D IVCVC3 Unpredictable Number Application Transaction Counter Calculate O by encrypting D with DES3 using KD CVC3 O:=eKDcvc3(D) The CVC3 obtained by taking the two LSB of O CVC3:= 0000 0000 0000 FFFF && O Slide No. 22

Communication with a Card Slide No. 23

Initial Transaction Flow Contactless Card Terminal Slide No. 24

Static Data Authentication(SDA) Issuer Certificate Authority Acquirer Static Application Data Private Key (Issuer) Si Public Key (Issuer) Pi Private Key(CA) Sca Public Key(CA) Pca Signed Static Application Data(SSAD) Issuer PK Certificate Issuer PK Certificate Slide No. 25

Obtaining Information off the Card(SDA Data) Contactless Card Terminal Slide No. 26

Dynamic Data Authentication(DDA) Issuer Private Key (ICC) Sic Static Application Data Public Key (ICC) Pic Private Key (Issuer) Si Public Key (Issuer) Pi Certificate Authority Private Key(CA) Sca Acquirer ICC PK Certificate Issuer PK Certificate Issuer PK Certificate Public Key(CA) Pca Slide No. 27

Combined DDA/AC Generation(CDA) Contactless Card Terminal Slide No. 28

Generate AC Command Causes the card to compute and return an Application Cryptogram (AC) Application Cryptogram Types: Type Abbreviation Meaning Application Authentication Cryptogram Authorization Request Cryptogram Transaction Certificate AAC ARQC TC Transaction declined Online authorization requested Transaction Approved Slide No. 29

Generate AC Command Generating the Cryptogram Generate the AC Session Key(SK ac ) Concatenate the CDOL data and ICC data Perform a CBC-MAC on the data using SKac. Slide No. 30

Generate AC Command Generating the Signed Dynamic Application Data(SDAD) TC/ARCQ data elements Amount Authorized(Numeric) Unpredictable Number Application Interchange Profile Application Transaction Counter Transaction Data PDOL Elements CDOL Elements CID Application Transaction Counter Issuer Application Data Encrypted by AC Session Key(SK AC ) Hashed with SHA-1 ICC Dynamic Data ICC Dynamic Number Length ICC Dynamic Number Cryptogram Information Data TC or ARQC Transaction Data Hash Code Signed with ICC Private Key Dynamic Application Data Signed Data Format Hash Algorithm Indicator ICC Dynamic Data Length ICC Dynamic Data Pad Pattern Unpredictable Number Slide No. 31

Combined DDA/AC Generation(CDA) Contactless Card Terminal Slide No. 32

Recent Developments NFC Phones Some Android phones now have built in NFC circuitry Code has been added to Android version 2.3.3 Can work with ISO14443 A and B; FeliCa; PROX etc. Android and Payment Cards A separate Secure Element is added to the phone This chip stores the Financial keys and data physically and logically from the Android OS. Functions like a separate Payment card Slide No. 33

Remote Sniffing + Demo REQA Slide No. 34 ATQA Captured from the audio-out of a wide-band receiver from 5 meters away BUT CVC3/CVV3 makes this not worthwhile on contactless payment cards I don t care if someone sniffs my pants!

Emissions Power Analysis Powerful class of attack Relies on capturing of emissions from cryptographic operations to determine the key used. Successfully demonstrated on the MIFARE DESFire (MF3ICD40) Card as used in the Victorian Myki transport card Unique keys in payments cards mitigate this attack See the paper Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation - Timo Kasper, David Oswald, and Christof Paar for more infomation Slide No. 35

Remote Sniffing using Software Defined Radios Potential for capturing and demodulating traces from a distance Other presentations today will be covering SDR technologies EMV works with Common Criteria testing to provide protection profile for cards Side channel analysis is part of the testing Payment cards protected against remote key recovery Slide No. 36

Protecting your card Patent Pending RFID shield/cooking material Highly flexible! Variety of formfactors Also makes a great jacket potato(sour cream not included) Slide No. 37

To Wrap Up Basics of contactless cards Security depends on the implementation Majority of new financial systems are built from existing standards which have been field tested. Technology to create virtual cards is built into the latest smartphones. The connection from the card to the terminal is not secure. It can be sniffed. Slide No. 38

Thank You For more information on what Witham Labs can do for you please visit: http://www.withamlabs.com Contact: Peter Fillmore peter.fillmore@withamlabs.com Slide No. 39