Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015



Similar documents
A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Electronic Payments Part 1

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV (Chip-and-PIN) Protocol

Smart Cards for Payment Systems

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors

Payment systems. Tuomas Aura T Information security technology

Formal models of bank cards for free

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

Formal analysis of EMV

Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

Visa Recommended Practices for EMV Chip Implementation in the U.S.

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Extending EMV payment smart cards with biometric on-card verification

EMV and Small Merchants:

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

M/Chip Functional Architecture for Debit and Credit

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Using EMV Cards to Protect E-commerce Transactions

EMV EMV TABLE OF CONTENTS

Card Technology Choices for U.S. Issuers An EMV White Paper

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

How To Protect A Smart Card From Being Hacked

Visa Smart Debit/Credit Certificate Authority Public Keys

EMV (Chip and PIN) Project. EMV card

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Chip Card (EMV ) CAL-Card FAQs

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

JCB Terminal Requirements

Understand the Business Impact of EMV Chip Cards

EMV: Background and Implications for Credit Unions

White Paper. EMV Key Management Explained

Credit card: permits consumers to purchase items while deferring payment

Introductions 1 min 4

EMV and Encryption + Tokenization: A Layered Approach to Security

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

How Secure are Contactless Payment Systems?

What Merchants Need to Know About EMV

welcome to liber8:payment

A RE T HE U.S. CHIP RULES ENOUGH?

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

A Guide to EMV Version 1.0 May 2011

Chip and PIN is Broken a view to card payment infrastructure and security

Credit Card Processing Overview

PAGE ONE Economics CLASSROOM EDITION. The Smart-Chip Credit Card: A Current Solution

How to Prepare. Point of sale requirements are changing. Get ready now.

What is a Smart Card?

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

Tokenization: FAQs & General Information. BACKGROUND. GENERAL INFORMATION What is Tokenization?

Preparing for EMV chip card acceptance

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT Hackito Ergo Sum 2012 April 12,13,14 Paris, France

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

The Canadian Migration to EMV. Prepared By:

CardControl. Credit Card Processing 101. Overview. Contents

EMV : Frequently Asked Questions for Merchants

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

EMV Frequently Asked Questions for Merchants May, 2014

EMV: A to Z (Terms and Definitions)

How To Understand And Understand The Security Of A Key Infrastructure

Online Payment Processing Definitions From Credit Research Foundation (

EMV ADOPTION AND ITS IMPACT ON FRAUD MANAGEMENT WORLDWIDE

Mitigating Fraud Risk Through Card Data Verification

Secure Payments Framework Workgroup

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

EMVCo Letter of Approval - Contact Terminal Level 2

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Securing Mobile Payment Protocol. based on EMV Standard

CPIM Academy. Cash 257 Merchant Services and Revenue Collection

What is EMV? What is different?

Securing the Payments System. The facts about fraud prevention

PayPass M/Chip Requirements. 10 April 2014

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

EMVCo Letter of Approval - Contact Terminal Level 2

THE ROAD TO U.S. EMV MIGRATION Information and Strategies to Help Your Institution Make the Change

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)

Presentation Rundown. Introduction Product Overview Product Features Product Value Product Applications Question and Answer

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

Requirements for an EMVCo Common Contactless Application (CCA)

Swedbank Payment Portal Implementation Overview

MasterCard PayPass. M/Chip, Acquirer Implementation Requirements. v.1-a4 6/06

Developing Payment Applications with RhoMobile Suites. Prashanth Kadur Software Architect

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

CITGO CHIP & MOBILE TM. Quick-Start Guide YOUR CUSTOMERS. are

Electronic Payments. EITN40 - Advanced Web Security

Fall Conference November 19 21, 2013 Merchant Card Processing Overview

Don t trust POS terminals! Verify in-shop payments with your phone

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

Transcription:

Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015

Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment Summary Questions

Problem: Payment Card Fraud (1) Types of Payment Cards o Debit o Credit In 2014, over 13 million Americans were victims Source: AiteGroup, EMV: Lessons Learned and the U.S. Outlook, June 2014

Problem: Payment Card Fraud (2) U.K. was early adopter of EuroPay, MasterCard, and VISA (EMV) technology Counterfeit cards (Cloning) decrease Card-Not-Present (CNP) fraud has sharp increase o Purchases over internet o Purchases over phone

Problem: Payment Card Fraud (3) 350 330 Card-not-Present Fraud losses in millions of pounds 310 290 270 250 230 210 190 170 150 2005 2006 2007 2008 The UK Cards Association

Traditional CNP Transactions Secret card data provides transaction authorization o Card number o Expiration Date o Etc. Third party passively viewing can repeat transaction

CNP Attack Man-in-the-middle-proxy (mitmproxy) Checkout Service o 127.0.0.1 GET https://api.stripe.com/v1/tokens?email=te stemail &card[number]=4242+4242+4242 +4242&card[cvc]=151&card[exp_month] =6&card[exp_year]=2016&card[name]=te stemail

Existing CNP Alternatives PayPal User card information encrypted on PayPal Servers Payment transactions done via tokenization Sniffed SSL traffic reveals some user information leaked o Account details encrypted prior to transmission

EMV Technology Chip-and-PIN EMV provides Card Verification Technologies o Static Data Authentication (SDA) o Dynamic Data Authentication (DDA) o Combined DDA & Application cryptogram (CDA)

EMV Dynamic Data Authentication (1) Private RSA key used for signature generation Provides Public Certificates o Card Certificate o Issuer Certificate Card Signature Verified By Issuer Public Certificate Verified By Certificate Authority Public Certificate

EMV Dynamic Data Authentication (2) Card Generate Signature Dynamic Data Terminal Transmits dynamic data to be included in signature Responds with signature Signature Verifies signature

EMV CNP Experiment Force online transactions to run DDA for card verification Verify signature at remote location Verify payment card data is not susceptible to man-in-the-middle attack

EMV CNP Components Client Machine Running Software Smart Card Reader Server Machine Running Software Payment Card with Integrated Chip

Client and Server Machines Client o Card Reader Software o Client HTTPS Software Server o XAMPP Server Software Apache MySQL Tomcat o Java Servlets Dynamic Data Generation Card Signature Verification

EMV CNP Steps Read Card Generate Dynamic Data Card Signature Generation Verification of Signature

Read Card Step ------------------------------------------------ Send READ RECORD to read SFI 1 record 4 ------------------------------------- APDU: 00 b2 04 0c 00 Response Parsed: 70 81 c3 -- Record Template 9f 46 81 b0 ICC Public Key Certificate 55 ea 24 5f 3c da 9f 47 01 ICC Public Key Exponent 03

Dynamic Data Generation Sample output from Server:

Card Signature Generation Send INTERNAL AUTHENTICATE command ------------------------------------------------ Sending HTTPS request to url : https://mrc7dpc/examples/getdyndata 77 73 -- Response Message Template Format 2 9f 4b 70 -- Signed Dynamic 46 f2 60 df Application Data Response Code : 200 authenticationrelateddata = F69A603757096EC1B3 Command Bytes: 00 88 00 00 09 f6 9a 60 37 57 09 6e c1 b3 00

Card Signature Verification (1) Certificate Authority (CA) Public Key o Application Identifier (AID) o CA Public Key Index Issuer Public Key Integrated Circuit Chip (ICC) Public Key o Card Public Key

Card Signature Verification (2) Sample output from Server:

Card Signature Verification (3) Sample output from Server:

Summary EMV deployment known to mitigate card-present fraud; does nothing for card-not-present (CNP) transactions Attempts to secure CNP payments with dynamic data authentication (DDA) using RSA key pair proved successful

Questions