Relay attacks on card payment: vulnerabilities and defences



Similar documents
Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Secure Payment Architecture

Banking Security Architecture

Chip & PIN notes on a dysfunctional security system

Chip and PIN is Broken a view to card payment infrastructure and security

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks

Formal analysis of EMV

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

Electronic Payments Part 1

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Payment systems. Tuomas Aura T Information security technology

Inside Risks EMV: Why Payment Systems Fail

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Risks of Offline Verify PIN on Contactless Cards

EMV and Small Merchants:

How To Hack An Rdi Credit Card

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Smart Cards for Payment Systems

How To Secure A Paypass Card From Being Hacked By A Hacker

CREDIT CARD PROCESSING GLOSSARY OF TERMS

Suzanne Lynch Professor of Practice Economic Crime Utica College sl6-15 1

Visa Recommended Practices for EMV Chip Implementation in the U.S.

Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket

What Merchants Need to Know About EMV

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Using EMV Cards to Protect E-commerce Transactions

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

EMV Frequently Asked Questions for Merchants May, 2014

EMV : Frequently Asked Questions for Merchants

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Electronic Payment Systems case studies

EMV EMV TABLE OF CONTENTS

PCI and EMV Compliance Checkup

EMV Acquiring at the ATM: Early Planning for Credit Unions

How To Protect A Smart Card From Being Hacked

How Smartcard Payment Systems Fail. Ross Anderson Cambridge

Prevention Is Better Than Cure EMV and PCI

MasterCard Special Edition

welcome to liber8:payment

RELIABILITY OF CHIP & PIN EVIDENCE IN BANKING DISPUTES

CardControl. Credit Card Processing 101. Overview. Contents

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Extending EMV payment smart cards with biometric on-card verification

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

Guide to credit card security

Credit Card Processing Overview

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

Cash 257 Merchant Services and Revenue Collection

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

ATM FRAUD AND COUNTER MEASURES

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

The Canadian Migration to EMV. Prepared By:

EMV in Hotels Observations and Considerations

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

How Secure are Contactless Payment Systems?

Client Server Registration Protocol

CONTACTLESS PAYMENTS. Joeri de Ruiter. University of Birmingham. (some slides borrowed from Tom Chothia)

CPIM Academy. Cash 257 Merchant Services and Revenue Collection

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS

How To Comply With The New Credit Card Chip And Pin Card Standards

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

Chip and PIN is Broken

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

A Brand New Checkout Experience

A Brand New Checkout Experience

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors

Implication of EMV Migration for the U.S. Transportation Industry. May 1, Implication of EMV Migration for the U.S. Transportation Industry

Langara College PCI Awareness Training

American Express Contactless Payments

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Helping you to protect yourself against fraud and financial crime

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Guide to Data Field Encryption

Understand the Business Impact of EMV Chip Cards

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

NFC technology user guide. Contactless payment by mobile

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT Hackito Ergo Sum 2012 April 12,13,14 Paris, France

NFC technology user guide. Contactless payment by mobile

Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Introductions 1 min 4

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Security in Near Field Communication (NFC)

Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s)

The Future is Contactless

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

NEWS BULLETIN

SETUP GUIDE. Thank you for your purchase of Hamilton products! In this handy guide, you will discover: ADDITIONAL REQUIREMENTS SETUP HOW IT WORKS

FAQ on EMV Chip Debit Card and Online Usage

Target Security Breach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

Transcription:

Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin, Germany

This talk describes our implementation of... a relay attack on a live smartcard-based payment system in the UK; and a low-cost distance bounding defence that limits the distance between participants to a few meters and below, without the need for a high frequency clock on the card. 2/22

Chip & PIN a is smartcard-based payment system that... is fully deployed in the UK since 2006, with banks making grand claims of security; uses the EMV (Europay MasterCard Visa) protocol with ISO 7816 mechanical/electrical/basic interface; 1066 requires a correct 4 digit PIN input for authorizing transactions (both at ATMs and cash registers); uses 3DES for Static Data Authentication (SDA); requires a symmetric key shared by bank and card; has several security flaws identified by researchers early in deployment, one being the relay attack. 3/22

A simplified smartcard transaction: Since data is static, authorization must be done on-line to prevent replay attacks; however, off-line authorizations are still possible under some conditions 4/22

Our attack was shown on BBC1 s consumer-watch program, which aired February 2007 We got our highest ratings of the run for the story (6.2 million, making it the most watched factual programme of last week)... it s provoked quite a response from viewers. Rob Unsworth, Editor, Watchdog Our demonstration helped many cardholders reach a favourable resolution with banks 5/22

The relay attack: Alice thinks she is paying $20, but is actually charged $2 000 for a purchase elsewhere Honest cardholder Alice and merchant Dave are unwitting participants in the relay attack 6a/22

The relay attack: Alice thinks she is paying $20, but is actually charged $2 000 for a purchase elsewhere Alice inserts her card into Bob s fake terminal, while Carol inserts a fake card into Dave s real terminal. Using wireless communication the $2 000 purchase is debited from Alice s account 6b/22

The relay kit : $500 worth of off-the-shelf hardware, two laptops and moderate engineering skill is all it takes. 7/22

Previously proposed defences may not be effective for defending against relay attacks Tamper evident/resistant terminals? Protects banks by erasing keys upon tampering; cardholders aren t trained to tell the difference. Physical examination of smartcard? Fake RFID card is an incremental engineering challenge Compare card number on receipt? Embossing machines are available; target repeat customers voltage (V) 3 2 1 0 0 10 20 30 40 50 time since start of exchange (µs) Impose timing constraints on terminal-card interaction? A good start, but short timing advantages translate into long distances; most interactions are predictable 8/22

Existing timing tolerances are too wide to be effective One device we tested allowed a 3 second round trip delay, which at the speed of light allows the real card to be 899 377 km away, i.e.: 11 times around the earth To the moon and back Not quite as far as Mars (their credit cards are safe) Even reducing the constraints to the minimum is not sufficient, since by only speeding up the card slightly, a large time advantage can eventually be built up The key to accurate distance bounding is to send short, 1-bit, messages 9/22

The basic distance bounding protocol is a rapid bit-exchange Distance bounding gives the terminal (verifier) assurance that the card (prover) is within a maximal distance by repeating multiple single-bit challenge-response exchanges and assuming signals travel at the speed of light. 10/22

Demonstration of the basic protocol... Both legitimate participants know the bit-sequences The goal is to prove that the distance between them is within a maximum bound An attacker should not be able to make it seem as if the two legitimate participants are closer 11a/22

Demonstration of the basic protocol... Both legitimate participants know the bit-sequences The goal is to prove that the distance between them is within a maximum bound An attacker should not be able to make it seem as if the two legitimate participants are closer 11b/22

Demonstration of the basic protocol... Both legitimate participants know the bit-sequences The goal is to prove that the distance between them is within a maximum bound An attacker should not be able to make it seem as if the two legitimate participants are closer 11c/22

Demonstration of the basic protocol... Both legitimate participants know the bit-sequences The goal is to prove that the distance between them is within a maximum bound An attacker should not be able to make it seem as if the two legitimate participants are closer 11d/22

The distance bounding protocol in detail... We use the Hancke-Kuhn protocol, which we adapted to a wired, half-duplex implementation considering EMV constraints: a two wire interface and cheap prover the protocol starts with a mutual exchange of nonces. 12a/22

The distance bounding protocol in detail... MACs are computed under shared key; verifier loads a shift register with random bits; prover splits MAC into two shift registers. 12b/22

The distance bounding protocol in detail... Timing critical phase: single bit challenge-response pairs are exchanged; response bit is the next bit from the shift register corresponding to the challenge bit s content; response bit is deleted at prover and stored at verifier. 12c/22

The distance bounding protocol in detail... The verifier checks that the responses are correct and concludes, based on its timing settings, the maximum distance the prover is away 12d/22

An attacker can try to get an advantage by... Guessing 1 2 of challenges and 1 2 of responses; With 64-bit, success probability ( 3 4 )64 1 in 2 26 ; however, only a single attempt is possible per nonce pair; Revealing both response registers by running the protocol twice: Prevented by the prover providing a nonce of its own. Sampling signals immediately, manipulate clock, transmit fast : Critical time is still very short, requiring a very capable attacker. Fool prover into exposing both registers state: Careful hardware design can prevent this. System should be designed for a particular distance 13/22

Experimental setup: 14/22

FPGA implementation is robust against capable attackers 15a/22

FPGA implementation is robust against capable attackers 15b/22

FPGA implementation is robust against capable attackers 15c/22

FPGA implementation is robust against capable attackers 15d/22

A single bit-pair exchange: challenge=1, response=0 voltage (V) 3 2 1 0 0 10 20 30 40 50 time since start of exchange (µs) 16/22

Our solution is low-cost and robust Distance bounding support needs to be added to EMV specs; Terminals need to operate at higher frequencies, plus shift registers and control circuitry; cards added with shift registers and control; re-issued with public-key (CDA/DDA); card-terminal interface is unchanged; customer-merchant experience unchanged. As banks adopt more secure methods of authentication, distance bounding should be added to thwart relay attacks 17/22

Current attacks on Chip and PIN are much less sophisticated Your name, account number and all information needed to make a fake card are stored on the card s magnetic stripe This includes the CVV, which banks use to confirm that the card is legitimate (not to be confused with the CVV2 printed on the back) A fraudster can use a magnetic stripe reader to perform a double-swipe The fraudster can watch/film the customer entering their PIN Tonight (ITV, 2007-05-04) 18/22

Card details and PIN can be intercepted on the wire In some cases, the magnetic stripe details are also sent along wires and can be intercepted there Another place to intercept communications is between the chip and the terminal The account number is sent from the chip to the terminal The PIN entered is sent from the terminal to the chip for verification So all the information needed by fraudsters can be collected from a single point Plusminus (ARD, 2006-03-07) 19/22

Once the details have been collected, a fake card can be created Even though UK cards have chips, ATMs will accept clones which appear to have a broken chip Alternatively, fraudsters can use the card abroad where ATMs do not have chip readers There, the cloned cards can be sold, protecting the people who collected the details originally Any magnetic stripe card will suffice, even a mobile phone top-up card ITV News (2006-06-12) 20/22

If the bank doesn t believe you re a victim, it can be very difficult to get your money back 21a/22

If the bank doesn t believe you re a victim, it can be very difficult to get your money back 21b/22

If the bank doesn t believe you re a victim, it can be very difficult to get your money back 21c/22

If the bank doesn t believe you re a victim, it can be very difficult to get your money back 21d/22

If the bank doesn t believe you re a victim, it can be very difficult to get your money back 21e/22

In summary, the banking card payment system suffers from a number of significant vulnerabilities The more simple problems, currently being exploited, can be fixed by disabling backwards compatibility features Other problems will require banks to adopt more secure, but slightly more expensive, types of cards Even if these steps are taken, relay attacks are still a risk; defending against these requires new hardware The root cause of these difficulties is that banks are able to pass the costs of fraud onto the victims A change in culture is needed to ensure liability for losses lies with the banks, who are in a position to improve security Paper, videos, and further discussion: http://www.cl.cam.ac.uk/research/security/banking/ http://www.lightbluetouchpaper.org/ end.