The Encryption Technology of Automatic Teller Machine Networks



Similar documents
Alliance AES Encryption for IBM i Solution Brief

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

1 Data Encryption Algorithm

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Secure Network Communications FIPS Non Proprietary Security Policy

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

PC Business Banking. Technical Requirements

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

IronKey Data Encryption Methods

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

The Advanced Encryption Standard (AES)

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

Guide to Data Field Encryption

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Automatic Encryption With V7R1 Townsend Security


Complying with PCI Data Security

AN3270 Application note

CSci 530 Midterm Exam. Fall 2012

Chapter 8. Network Security

CS Computer Security Third topic: Crypto Support Sys

Security for Computer Networks

e-code Academy Information Security Diploma Training Discerption

Global Journal of Computer Science and Technology

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

NETWORK ADMINISTRATION AND SECURITY

Table of Contents. Bibliografische Informationen digitalisiert durch

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

Security Policy for Oracle Advanced Security Option Cryptographic Module

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Lecture 9 - Network Security TDTS (ht1)

Blaze Vault Online Backup. Whitepaper Data Security

SeChat: An AES Encrypted Chat

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

SSL Firewalls

Lecture 4 Data Encryption Standard (DES)

Network Security. Lecture 3

EXAM questions for the course TTM Information Security May Part 1

Network Security - ISA 656 Introduction to Cryptography

How To Encrypt With A 64 Bit Block Cipher

Cryptographic Engine

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

SecureD Technical Overview

Cryptography and Network Security Block Cipher

NWIMS. Online Backup Security Documentation

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Cisco VPN Internal Service Module for Cisco ISR G2

VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module

Network Security. Modes of Operation. Steven M. Bellovin February 3,

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SecureDoc Disk Encryption Cryptographic Engine

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Citrix MetaFrame XP Security Standards and Deployment Scenarios

FIPS Security Policy 3Com Embedded Firewall PCI Cards

Advanced Encryption Standard (AES) User's Guide

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Using BroadSAFE TM Technology 07/18/05

Thanks, But No Thanks

Weighted Total Mark. Weighted Exam Mark

Healthcare Compliance Solutions

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Modes of Operation of Block Ciphers

ProtectDrive. User Manual Revision: B00

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

ACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS Non-Proprietary Security Policy

Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4.

SystemWeaver License Manager A business aware license scheme and implementation

SkyRecon Cryptographic Module (SCM)

EDA385 Embedded Systems Design. Advanced Course

VERITAS NetBackup 6.0 Encryption

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

UM0586 User manual. STM32 Cryptographic Library. Introduction

FIPS Documentation: Security Policy 05/06/ :21 AM. Windows CE and Windows Mobile Operating System. Abstract

A Comparative Study of Security Features in FreeBSD and OpenBSD

Understanding the Cisco VPN Client

13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA United States of America

Ahsay Online Backup. Whitepaper Data Security

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

The Misuse of RC4 in Microsoft Word and Excel

EMC VMAX3 DATA AT REST ENCRYPTION

SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS Security Policy

Enova X-Wall LX Frequently Asked Questions

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Transcription:

Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005

1 Introduction ATM also known as Automatic Teller Machine is a simple and yet security banking service. The basic concept is that an ATM allows an authorized cardholder to conduct banking transaction without visiting a branch. They are well known for its convenience to the customers, cost-effectiveness to the bank and most importantly it is an extremely secure banking method. ATMs rely on authorization of a transaction by the bank via a secure communications network. Encryption methods are built into the communication network to prevent unauthorized transactions that could result in loses. This report focuses on Data Encryption Standard and Advanced Encryption Standard, these are the encryption standards presently adopted by banks across the globe. 1.1 Hardware and Software ATMs contain secure crypto-processors, generally within an IBM PC compatible host computer in a secure enclosure. The security of the machine relies mostly on the integrity of the secure crypto-processor: the host software often runs on a commodity operating system. In-store ATMs typically connect directly to their ATM Transaction Processor via a modem over a dedicated telephone line, although the move towards Internet connections is under way. In addition, ATMs are moving away from custom circuit boards (most of which are based on Intel 8086 architecture) and into fullfledged PCs with commodity operating systems such as Windows 2000 and Linux. Other platforms include RMX 86, OS/2 and Windows 98 bundled with Java. The newest ATMs with Microsoft technology use Windows XP or Windows XP embedded. [Lockergnome Encyclopedia 2004] 2 ATM Encryption Methods ATM transactions are usually encrypted with DES (please refer to the next section) but most transaction processors will require the use of the more secure Triple DES by 2005. There are also many "phantom withdrawals" from ATMs, which banks often claim are the result of fraud by customers. Many experts ascribe phantom withdrawals to the criminal activity of dishonest insiders. Ross Anderson, a leading cryptography researcher, has been involved in investigating many cases of phantom withdrawals, and has been responsible for exposing several errors in bank security. There have also been a number of incidents of fraud where criminals have used fake machines or have attached fake keypads or card readers to existing machines. These 1

have then been used to record customers' PINs and bank account details in order to gain unauthorized access to their accounts. [Lockergnome Encyclopedia 2004] 2.1 Data Encryption Standard The Data Encryption Standard (DES) is an approved cryptographic algorithm selected as an official Federal Information Processing Standard (FIPS) for the United States. [Lockergnome Encyclopedia 2004] In DES, data are encrypted in 64-bit blocks using a 56-bit key. The algorithm transforms 64-bit input in a series of steps into a 64-bit output. [William Stallings 2003]. For further details of DES encryption and decryption, please refer to Cryptography And Network Security, Principle and Practice 3 rd ed. by William Stallings. FIPS PUB 81, DES Modes of Operation, describes four different modes for using the algorithm described in this standard. These four modes are called the Electronic Codebook (ECB) mode, the Cipher Block Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the Output Feedback (OFB) mode. ECB is a direct application of the DES algorithm to encrypt and decrypt data; CBC is an enhanced mode of ECB which chains together blocks of cipher text; CFB uses previously generated cipher text as input to the DES to generate pseudorandom outputs which are combined with the plaintext to produce cipher, thereby chaining together the resulting cipher; OFB is identical to CFB except that the previous output of the DES is used as input in OFB while the previous cipher is used as input in CFB. OFB does not chain the cipher. [Federal Information Processing Standards Publication 46-2 1993] 2.2 Advanced Encryption Standard There are cases where ATMs using DES has been breached within 24 hours. The most recent solution is to adopt a new encryption standard known as the Advanced Encryption Standard. The Advanced Encryption Standard (AES) feature adds support for the new encryption standard AES, with Cipher Block Chaining (CBC) mode, to IP Security (IPSec). The National Institute of Standards and Technology (NIST) has created AES, which is a new Federal Information Processing Standard (FIPS) publication that describes an encryption method. AES is a privacy transform for IPSec and Internet Key Exchange (IKE) and has been developed to replace the Data Encryption Standard (DES). AES is designed to be more secure than DES: AES offers a larger key size, while ensuring that the only known approach to decrypt a message is for an intruder to try every possible key. AES has a variable key 2

length the algorithm can specify a 128-bit key (the default), a 192-bit key, or a 256-bit key. [Cisco Systems, Inc. 2004] 3 Conclusion Behind the friendly appearance of the Automatic Teller Machines, they are actually protected by some of the most advanced encryption technologies. However, ATM security requires progressively improving methods to keep up with smart intruders. A clear example is the upgrade from the Data Encryption Standard to the Advanced Encryption Standard, which is almost three times as powerful. In the near future, a new method will be adopted to protect ATMs from intruders with better technologies. Although, this is a constant battle between intruders and the bank, ATMs are still a very convenient, cost-effective and secure banking method provided to customers today. 3

References 1. Automatic Teller Machine, Lockergnome Encyclopedia 2004 [Retrieved from web March 25 th, 2005] http://encyclopedia.lockergnome.com/ 2. Cryptography And Network Security, Principle and Practice 3 rd ed., William Stallings 2003 [Retrieved from text March 20 th, 2005] 3. Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-2 1993 [Retrieved from web March 25 th, 2005] http://www.itl.nist.gov/fipspubs/fip46-2.htm 4. Advanced Encryption Standard (AES), Cisco Systems, Inc. 2004 [Retrieved from web March 25 th, 2005] http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/ 122t13/ft_aes.htm 4