Risk ManagementFirst lesson of Banking – no Risk, no Profit.Financial Security models are always a balance.No System is Secure but it can be judged Secure Enough.Bankers have been evaluating risk and profit since the days of barter.No Security model exists in isolation.Chip & PIN builds on a considerable existing security framework
Business ObjectivesDriven by simple commercial propositionAugmented by reputational elementsIncorporate behavioural evolutionNeeds to account for and predict technology.Needs to be viable for all parties.Subject to review and planned to continuously evolve.
CryptoBasis of TrustRSA Public Key SchemeStatic Data AuthenticationDynamic Data AuthenticationTriple (Double Length) DESOnline mutual AuthenticationPINWhat you have: TokenWhat you know: Crypto engine / Keys / PIN
Attack ScenariosForced attack / threat e.g. TheftCard not present / non PIN verified e.g. InternetMobile CommerceInternational e.g. Fallback
Attack ScenariosHard Attack of Crypto – RSA or 3*DESExploit Procedural Elements e.g. RelayTransaction flow logistics e.g. Terminal MinderDisintermediate parties e.g. WedgeTechnology Element e.g. Differential Power Analysis
Investment / Reward800 Million cards and growing.Fraud is a commercial business.Cost / Benefit model based.Requires significant resource dedication.Limited skill set availability.Requires greater resource to exploit.Active detection methods can rapidly terminate activity.
Chip & PIN TodayOverall scheme security remains intact and strongHard card attack scenarios provide poor business caseSoft card attack scenarios exploit interfaces and provide little business caseLargest exposure remains non-chip usageNew channels building in support to leverage             chip and PIN – e.g. HomePay reader at homeStill fit for purpose !!
Chip & PIN @ HomeHomePay Secure e-commerce payments with Chip & PIN

More Related Content

PPT
Point of Sale Insecurity: A Threat to Your Business
PPTX
Cyber Threat Management
PDF
Cybersecurity- What Retailers Need To Know
PPT
E-Banking Web Security
PPT
Tech trends in Banking Industry
PPTX
Login cat tekmonks - v5 (mini)
PPT
Ec2009 ch10 e commerce security
PPTX
Pre-PostBreach_Are_Your_Ready
Point of Sale Insecurity: A Threat to Your Business
Cyber Threat Management
Cybersecurity- What Retailers Need To Know
E-Banking Web Security
Tech trends in Banking Industry
Login cat tekmonks - v5 (mini)
Ec2009 ch10 e commerce security
Pre-PostBreach_Are_Your_Ready

Viewers also liked (20)

PPTX
IWC 2013 Budget Presentation
PPTX
Didáctica de la historia en la educación infantil
PPTX
Propuesta metodológica sesion 2
PPTX
Transportation Plan
PPTX
Tx Gradebook Orientation
PPT
Slide presentation
PPTX
Custom personalized bedding
PPT
ISA LA Instrumentation2009handout
PDF
Technology cart distribution notes
PDF
LG Soluciones para Hotelería
PPT
PPTX
Sesion 3 actividad 1
PDF
12 komunikace a tvorba znalostí
PDF
Campus navigator
PPT
PracticeTEchnology
PPT
Gi Laboratory Nurse Bedside
DOCX
Creating groups in gradebook
DOCX
La escuela unitaria
PDF
Jaro 2011 rozvoj kreativity - vyroba kocici busty
PPTX
IWC 2013 Budget Presentation (revised)
IWC 2013 Budget Presentation
Didáctica de la historia en la educación infantil
Propuesta metodológica sesion 2
Transportation Plan
Tx Gradebook Orientation
Slide presentation
Custom personalized bedding
ISA LA Instrumentation2009handout
Technology cart distribution notes
LG Soluciones para Hotelería
Sesion 3 actividad 1
12 komunikace a tvorba znalostí
Campus navigator
PracticeTEchnology
Gi Laboratory Nurse Bedside
Creating groups in gradebook
La escuela unitaria
Jaro 2011 rozvoj kreativity - vyroba kocici busty
IWC 2013 Budget Presentation (revised)
Ad

Similar to Cracking Chip & PIN (20)

PPTX
Sgsits cyber securityworkshop_4mar2017
PPT
End-to-End Encryption for Credit Card Processing
PDF
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
PDF
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
DOCX
Experiment
PDF
PDF
Replace The Current Antiquated Credit Card System
PPT
PPT
Life After Compliance march 2010 v2
PPTX
Credit Card Fraud Detection project.pptx
PPT
System Z Mainframe Security For An Enterprise
PPTX
Hacking Point of Sale
PPT
Hw09 Large Scale Transaction Analysis
PPTX
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
TXT
Smart card emv for dummies
PPTX
E banking security
PPTX
E-commerce security using asymmetric key algorithm
PDF
Managing & Securing the Online and Mobile banking - Chew Chee Seng
PPTX
PCI Compliance (for developers)
PPTX
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Sgsits cyber securityworkshop_4mar2017
End-to-End Encryption for Credit Card Processing
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Experiment
Replace The Current Antiquated Credit Card System
Life After Compliance march 2010 v2
Credit Card Fraud Detection project.pptx
System Z Mainframe Security For An Enterprise
Hacking Point of Sale
Hw09 Large Scale Transaction Analysis
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
Smart card emv for dummies
E banking security
E-commerce security using asymmetric key algorithm
Managing & Securing the Online and Mobile banking - Chew Chee Seng
PCI Compliance (for developers)
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Ad

More from onthewight (20)

PDF
Dr Robin Wilson - Monitoring the environment from space
PPTX
Dr Stephen Prior - Drones and other Unmanned Air Vehicles - Cafe Sci Isle of ...
PDF
David Prendergast - Innovative Physics - From AI to Fukushima - Isle of Wight...
PPTX
Prof Paul White - The behaviour of marine mammals - Cafe Scientifique - Mar 2018
PPT
Dr Michelle Hale - Importance Of Marine Phytoplankton In Controlling Climate ...
PPTX
Dr Catherine Mercer and Dr Frank Ratcliff - The 100,000 Genome Project - Jan ...
PPTX
Dr. Jon Whitehurst - Bats, Maths and Maps - Isle of Wight Cafe Sci - Nov 2016
PPTX
NAHT explain Progress 8
PPTX
Dr Richard Crowder - Termites, Bees and Robots - 14 Mar 2016 - Isle of Wight ...
PPTX
News Rewired Presentation - OnTheWight's experience with Automated Articles -...
PDF
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
ODP
Professor John Coleman, Phonetics Department, Oxford University, talk "Voices...
PPTX
Innovation at OnTheWight - Presented at What's next for Community Journalism ...
PPT
Prof Arnold Taylor: The significant experiments of Robert Hooke - 8 June 2015
PDF
Prof Steve F King 'The standard models in particle physics'
PPTX
Intriguing Neutrinos: The Deep Secrets of Nature’s Ghosts by Dr Elisabeth Falk
PDF
Nanodevices for the detection of disease by Maurits de Planque
PDF
East Cowes - Proposed development - Solent Gateways - Dec 2014
PPT
Prof Graham Mills - The Fate of Pharmaceutical Residues in the Aquatic Enviro...
PDF
Dr Luke Myers - Tidal Power Isle of Wight - Cafe Scientifique - Sept 2014
Dr Robin Wilson - Monitoring the environment from space
Dr Stephen Prior - Drones and other Unmanned Air Vehicles - Cafe Sci Isle of ...
David Prendergast - Innovative Physics - From AI to Fukushima - Isle of Wight...
Prof Paul White - The behaviour of marine mammals - Cafe Scientifique - Mar 2018
Dr Michelle Hale - Importance Of Marine Phytoplankton In Controlling Climate ...
Dr Catherine Mercer and Dr Frank Ratcliff - The 100,000 Genome Project - Jan ...
Dr. Jon Whitehurst - Bats, Maths and Maps - Isle of Wight Cafe Sci - Nov 2016
NAHT explain Progress 8
Dr Richard Crowder - Termites, Bees and Robots - 14 Mar 2016 - Isle of Wight ...
News Rewired Presentation - OnTheWight's experience with Automated Articles -...
Dr Jen Gupta - Understanding nature’s death ray guns - 13 Oct 2015
Professor John Coleman, Phonetics Department, Oxford University, talk "Voices...
Innovation at OnTheWight - Presented at What's next for Community Journalism ...
Prof Arnold Taylor: The significant experiments of Robert Hooke - 8 June 2015
Prof Steve F King 'The standard models in particle physics'
Intriguing Neutrinos: The Deep Secrets of Nature’s Ghosts by Dr Elisabeth Falk
Nanodevices for the detection of disease by Maurits de Planque
East Cowes - Proposed development - Solent Gateways - Dec 2014
Prof Graham Mills - The Fate of Pharmaceutical Residues in the Aquatic Enviro...
Dr Luke Myers - Tidal Power Isle of Wight - Cafe Scientifique - Sept 2014

Recently uploaded (20)

DOCX
search engine optimization ppt fir known well about this
PPTX
Modernising the Digital Integration Hub
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Five Habits of High-Impact Board Members
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
search engine optimization ppt fir known well about this
Modernising the Digital Integration Hub
Custom Battery Pack Design Considerations for Performance and Safety
The influence of sentiment analysis in enhancing early warning system model f...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Developing a website for English-speaking practice to English as a foreign la...
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
What is a Computer? Input Devices /output devices
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Five Habits of High-Impact Board Members
sbt 2.0: go big (Scala Days 2025 edition)
NewMind AI Weekly Chronicles – August ’25 Week III
1 - Historical Antecedents, Social Consideration.pdf
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
CloudStack 4.21: First Look Webinar slides
sustainability-14-14877-v2.pddhzftheheeeee
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Convolutional neural network based encoder-decoder for efficient real-time ob...

Cracking Chip & PIN

  • 1. Risk ManagementFirst lesson of Banking – no Risk, no Profit.Financial Security models are always a balance.No System is Secure but it can be judged Secure Enough.Bankers have been evaluating risk and profit since the days of barter.No Security model exists in isolation.Chip & PIN builds on a considerable existing security framework
  • 2. Business ObjectivesDriven by simple commercial propositionAugmented by reputational elementsIncorporate behavioural evolutionNeeds to account for and predict technology.Needs to be viable for all parties.Subject to review and planned to continuously evolve.
  • 3. CryptoBasis of TrustRSA Public Key SchemeStatic Data AuthenticationDynamic Data AuthenticationTriple (Double Length) DESOnline mutual AuthenticationPINWhat you have: TokenWhat you know: Crypto engine / Keys / PIN
  • 4. Attack ScenariosForced attack / threat e.g. TheftCard not present / non PIN verified e.g. InternetMobile CommerceInternational e.g. Fallback
  • 5. Attack ScenariosHard Attack of Crypto – RSA or 3*DESExploit Procedural Elements e.g. RelayTransaction flow logistics e.g. Terminal MinderDisintermediate parties e.g. WedgeTechnology Element e.g. Differential Power Analysis
  • 6. Investment / Reward800 Million cards and growing.Fraud is a commercial business.Cost / Benefit model based.Requires significant resource dedication.Limited skill set availability.Requires greater resource to exploit.Active detection methods can rapidly terminate activity.
  • 7. Chip & PIN TodayOverall scheme security remains intact and strongHard card attack scenarios provide poor business caseSoft card attack scenarios exploit interfaces and provide little business caseLargest exposure remains non-chip usageNew channels building in support to leverage chip and PIN – e.g. HomePay reader at homeStill fit for purpose !!
  • 8. Chip & PIN @ HomeHomePay Secure e-commerce payments with Chip & PIN
  • 9. Remote authentication to remote services such as home banking
  • 10. P2P, B2B, and G2P payment processing