SlideShare a Scribd company logo
Understanding the Role of
Hardware Data Encryption in
EMV and P2PE from the
CEO’s Perspective
Futurex. An Innovative Leader in
Encryption Solutions.
• For over 30 years, more than 15,000 customers worldwide
• Hardware-based solutions with integrated applications
provide the highest levels of compliance and security
• Entrepreneurial culture, fostering agility and innovation in
the development of hardware encryption solutions
• Results-oriented engineering team based in our U.S.
Technology Campus, with significant experience
delivering First-to-Market Customer Initiatives
• Members of ANSI X9F and PCI Security Standards Council
bodies, CTGA-certified Solutions Architects
Unique Perspective of Futurex
As a hardware data encryption provider, Futurex has a
unique perspective of security in card transactions.
 Issuers: data preparation, personalization, validation
 Device Manufacturers: Certificate Authority (CA) and key
management
 Merchant Service Providers: key management and CA
 Merchants: transaction security and key management
 Acquirers: processing encrypted data in transactions
 Switches: processing encrypted data in transactions
3
Why Use Hardware Security Modules?
• Prevents insider attack
–Dual Control
–Split Knowledge
–Tamper Protection for Keys
–Encryption Key Management
• PCI Requirement (aka SCD)
• Certifications (FIPS, PCI HSM)
4
PCI Requirements for HSMs
PCI DSS Requirement HSM Coverage (*Summary)
#3.4 Render PAN unreadable… Encryption, decryption, tokenization
#3.5 Protect any keys… FIPS 140-2 Level 3 Secure Cryptographic
Devices (SCDs)
#3.6 Fully document and
implement…key-management
NIST approved pseudo random number
generator (PRNG), use key encrypting keys,
and protect all keys under the Master File
Key.
#4.1 Use strong cryptography
to protect cardholder data
Meet PCI requirements for strong
cryptography.
* Full details provided in separate white paper.
PCI Requirements for HSMs
“In addition, it is important to note that in EMV
environments the PAN is not kept confidential at
any point in the transaction, indeed, it is necessary
for the PAN to be processed by the point-of-sale
terminal in the clear in order to complete critical
steps in the EMV transaction process. The expiry
date and other cardholder data are also
transmitted in clear-text.”
Ref: PCI DSS Applicability in an EMV Environment – A Guidance Document October
2010
Attack Vectors in a Card Transaction
1. Card cloning attacks and card theft
Transaction
Acquirer
Payment Card
Brand Point-of-Interaction
Cardholder
Card Issuer
2. Attacks internal to POI devices
3. Network level attacks
4. System level attacks (data breaches)
A. Malware attacks
B. Attacks on applications and databases
C. Attacks on backups/storages media
Attack Vectors in a Card Transaction
“P2PE technology is complementary to
EMV chip technology, by providing an
added layer of protection against the
threat of data breaches...”
Aug 2012 VISA Press Release on PR Newswire.
9
Role of HSM in EMV
 Data Preparation and Card Personalization
 Online Card Validation During Transaction
Role of HSM in EMV
Data Preparation and Card Personalization
Data Preparation
• Key/certificate management for authentication, data integrity and issuer scripting
• Offline and online PIN block generation for user authentication
• SDA / DDA / CDA signatures (for offline validation)
Integrated Circuit Card
(ICC) or Smart Card
Issuer Personalization
Data
Preparation
Personalization
• Key management for confidentiality, authentication, and data integrity
• Protection of sensitive personalization data
HSM/SCD HSM/SCD
Role of HSM in EMV
Online Card Validation During Transaction
1.Authentication request from POI to issuer
Transaction
Acquirer
Payment Card
Brand
3. Response Cryptogram
1. Request Cryptogram
Card Issuer
Point-of-Interaction
Cardholder
HSM/SCD
Host
2
2. Issuer validates request
3. Response from issuer to POI
12
Role of HSM in P2PE
 What is Point-to-Point Encryption?
 Protecting Data In Transit: Device Key Management
 Encryption, Decryption, Key Management, Tokens
What is Point-to-Point Encryption?
Point-to-Point Encryption (P2PE) is encryption of sensitive data at
the Point-of-Interaction for secure transmission to a secure
boundary where it may be decrypted, re-encrypted or tokenized.
Host
Application
HSM/SCD
Point of Interaction
The Role of HSMs in P2PE
Protecting Data in Transit: Device Key Management
• HSM for compliant key generation
HSM/SCD
Secure Injection Facility
HSM/SCD
Datacenter Remote Device
• Key lifecycle management
• Remote or direct key injection
Generate
Distribute
Track Usage
Backup
Revoke
Terminate
Archive
Role of HSM in P2PE
Encryption, Decryption, Key Management & Tokens
• Encryption and Decryption
• Key Management
= Encryption/Decryption = Data At Rest
= Data In Transit
Switch
Host
Merchant
(POI)
Acquirer
Host
DB
HSM/SCD
DB
= Token
• Tokens
* Case Study available
upon request
16
Role of HSM in EMV and P2PE Environments
 Typical Architecture of HSMs
 Services to Look for in an HSM Provider
 What to Ask for when Selecting HSMs
Typical Architecture for HSMs
• Remote Access
• Centralized
Administration
• High Availability
• Redundant
• Compliant
• Secured
• Customizable
Primary Site
HSM #1 HSM #2
Secure
Management Server
Redundant Failover
HSM #1 HSM #2
Secure
Management Server
Secondary Site
Direct Load Balancing
Automatic Synchronization* (All devices designated as
Production within group)
Remote Access
Device
Exceptional Support
 TR-39-certified and PCI Subject Matter Experts
 24x7x365 Business Critical support
 Exceptional Support Services
• Training (virtual or onsite)
• Customized consulting
• Hosted solutions
• Certificate authority
• Hosted HSMs for development and testing
• Customized solution development
Services to Look For in an HSM Provider
In Summary…
What to ask for when selecting HSMs
• Is the solution comprehensive?
• Is the solution manageable (i.e., will
you be able to pass audits easily)?
• Is the solution scalable?
• Does the vendor’s support team have
expertise in industry compliance
requirements?
19
Thank You!
20
Greg Stone
Sr. Solutions Architect
gstone@futurex.com
Ryan Smith
Chief Solutions Architect
rsmith@futurex.com
Booth #708

More Related Content

PPTX
easy-Speak for Toastmasters Made Easy
PDF
Overview of Spanning Tree Protocol
PDF
Protocoles SSL/TLS
PPT
Lire les tables de routage
PDF
Payment Hsm Payshield9000
PPTX
Detailed explanation of Basic router configuration
PPT
PDF
projet sur le vpn presentation
easy-Speak for Toastmasters Made Easy
Overview of Spanning Tree Protocol
Protocoles SSL/TLS
Lire les tables de routage
Payment Hsm Payshield9000
Detailed explanation of Basic router configuration
projet sur le vpn presentation

What's hot (11)

PPTX
Switching and Port Security
PPTX
Zigbee Security
PPT
Implementing 802.1x Authentication
PPTX
Sub Netting
PDF
Mise en place d'une solution VOIP sécurisée
PPT
Chap 19 ftp & tftp
PPTX
Cryptosystéme de ElGamal
PDF
Rapport PFE-Implémentation de la solution Dual-Homing
PPTX
HSM Basic Training
PDF
CNIT 141 7. Keyed Hashing
PPTX
Cisco module 3
Switching and Port Security
Zigbee Security
Implementing 802.1x Authentication
Sub Netting
Mise en place d'une solution VOIP sécurisée
Chap 19 ftp & tftp
Cryptosystéme de ElGamal
Rapport PFE-Implémentation de la solution Dual-Homing
HSM Basic Training
CNIT 141 7. Keyed Hashing
Cisco module 3
Ad

Viewers also liked (7)

PPTX
Futurex Secure Key Injection Solution
PPTX
P2PE Solutions From Futurex
PPTX
Futurex Slides at ACI Exchange 2013, Boston
PPTX
P2PE - PCI DSS
PDF
Abdullin modern payments security. emv, nfc, etc
PPTX
Key management
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Futurex Secure Key Injection Solution
P2PE Solutions From Futurex
Futurex Slides at ACI Exchange 2013, Boston
P2PE - PCI DSS
Abdullin modern payments security. emv, nfc, etc
Key management
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Ad

Similar to Understanding the Role of Hardware Data Encryption in EMV and P2PE (20)

PDF
Point-to-Point Encryption: Best Practices and PCI Compliance Update
PDF
Embedded System Security: Learning from Banking and Payment Industry
PDF
PCI DSS for Pentesting
PPT
IBM Share Conference 2010, Boston, Ulf Mattsson
PPTX
PCI DSS for Penetration Testing
PPTX
PCI Descoping: How to Reduce Controls and Streamline Compliance
PPT
End-to-End Encryption for Credit Card Processing
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
PCI Compliance (for developers)
PDF
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
PPTX
PPTX
Webinar - PCI PIN, PCI cryptography & key management
PDF
Vanderhoof smartcard-roadmap
PPTX
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PDF
SmartCard Forum 2009 - OpenTrust SCM
PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
PKI_Applications digital certificate.ppt
PPTX
Data protection on premises, and in public and private clouds
PPTX
Straight Talk on Data Tokenization for PCI & Cloud
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Embedded System Security: Learning from Banking and Payment Industry
PCI DSS for Pentesting
IBM Share Conference 2010, Boston, Ulf Mattsson
PCI DSS for Penetration Testing
PCI Descoping: How to Reduce Controls and Streamline Compliance
End-to-End Encryption for Credit Card Processing
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PCI Compliance (for developers)
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Webinar - PCI PIN, PCI cryptography & key management
Vanderhoof smartcard-roadmap
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
Key Concepts for Protecting the Privacy of IBM i Data
SmartCard Forum 2009 - OpenTrust SCM
Public Key Infrastructure and Application_Applications.ppt
PKI_Applications digital certificate.ppt
Data protection on premises, and in public and private clouds
Straight Talk on Data Tokenization for PCI & Cloud

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf

Understanding the Role of Hardware Data Encryption in EMV and P2PE

  • 1. Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO’s Perspective
  • 2. Futurex. An Innovative Leader in Encryption Solutions. • For over 30 years, more than 15,000 customers worldwide • Hardware-based solutions with integrated applications provide the highest levels of compliance and security • Entrepreneurial culture, fostering agility and innovation in the development of hardware encryption solutions • Results-oriented engineering team based in our U.S. Technology Campus, with significant experience delivering First-to-Market Customer Initiatives • Members of ANSI X9F and PCI Security Standards Council bodies, CTGA-certified Solutions Architects
  • 3. Unique Perspective of Futurex As a hardware data encryption provider, Futurex has a unique perspective of security in card transactions.  Issuers: data preparation, personalization, validation  Device Manufacturers: Certificate Authority (CA) and key management  Merchant Service Providers: key management and CA  Merchants: transaction security and key management  Acquirers: processing encrypted data in transactions  Switches: processing encrypted data in transactions 3
  • 4. Why Use Hardware Security Modules? • Prevents insider attack –Dual Control –Split Knowledge –Tamper Protection for Keys –Encryption Key Management • PCI Requirement (aka SCD) • Certifications (FIPS, PCI HSM) 4
  • 5. PCI Requirements for HSMs PCI DSS Requirement HSM Coverage (*Summary) #3.4 Render PAN unreadable… Encryption, decryption, tokenization #3.5 Protect any keys… FIPS 140-2 Level 3 Secure Cryptographic Devices (SCDs) #3.6 Fully document and implement…key-management NIST approved pseudo random number generator (PRNG), use key encrypting keys, and protect all keys under the Master File Key. #4.1 Use strong cryptography to protect cardholder data Meet PCI requirements for strong cryptography. * Full details provided in separate white paper.
  • 6. PCI Requirements for HSMs “In addition, it is important to note that in EMV environments the PAN is not kept confidential at any point in the transaction, indeed, it is necessary for the PAN to be processed by the point-of-sale terminal in the clear in order to complete critical steps in the EMV transaction process. The expiry date and other cardholder data are also transmitted in clear-text.” Ref: PCI DSS Applicability in an EMV Environment – A Guidance Document October 2010
  • 7. Attack Vectors in a Card Transaction 1. Card cloning attacks and card theft Transaction Acquirer Payment Card Brand Point-of-Interaction Cardholder Card Issuer 2. Attacks internal to POI devices 3. Network level attacks 4. System level attacks (data breaches) A. Malware attacks B. Attacks on applications and databases C. Attacks on backups/storages media
  • 8. Attack Vectors in a Card Transaction “P2PE technology is complementary to EMV chip technology, by providing an added layer of protection against the threat of data breaches...” Aug 2012 VISA Press Release on PR Newswire.
  • 9. 9 Role of HSM in EMV  Data Preparation and Card Personalization  Online Card Validation During Transaction
  • 10. Role of HSM in EMV Data Preparation and Card Personalization Data Preparation • Key/certificate management for authentication, data integrity and issuer scripting • Offline and online PIN block generation for user authentication • SDA / DDA / CDA signatures (for offline validation) Integrated Circuit Card (ICC) or Smart Card Issuer Personalization Data Preparation Personalization • Key management for confidentiality, authentication, and data integrity • Protection of sensitive personalization data HSM/SCD HSM/SCD
  • 11. Role of HSM in EMV Online Card Validation During Transaction 1.Authentication request from POI to issuer Transaction Acquirer Payment Card Brand 3. Response Cryptogram 1. Request Cryptogram Card Issuer Point-of-Interaction Cardholder HSM/SCD Host 2 2. Issuer validates request 3. Response from issuer to POI
  • 12. 12 Role of HSM in P2PE  What is Point-to-Point Encryption?  Protecting Data In Transit: Device Key Management  Encryption, Decryption, Key Management, Tokens
  • 13. What is Point-to-Point Encryption? Point-to-Point Encryption (P2PE) is encryption of sensitive data at the Point-of-Interaction for secure transmission to a secure boundary where it may be decrypted, re-encrypted or tokenized. Host Application HSM/SCD Point of Interaction
  • 14. The Role of HSMs in P2PE Protecting Data in Transit: Device Key Management • HSM for compliant key generation HSM/SCD Secure Injection Facility HSM/SCD Datacenter Remote Device • Key lifecycle management • Remote or direct key injection Generate Distribute Track Usage Backup Revoke Terminate Archive
  • 15. Role of HSM in P2PE Encryption, Decryption, Key Management & Tokens • Encryption and Decryption • Key Management = Encryption/Decryption = Data At Rest = Data In Transit Switch Host Merchant (POI) Acquirer Host DB HSM/SCD DB = Token • Tokens * Case Study available upon request
  • 16. 16 Role of HSM in EMV and P2PE Environments  Typical Architecture of HSMs  Services to Look for in an HSM Provider  What to Ask for when Selecting HSMs
  • 17. Typical Architecture for HSMs • Remote Access • Centralized Administration • High Availability • Redundant • Compliant • Secured • Customizable Primary Site HSM #1 HSM #2 Secure Management Server Redundant Failover HSM #1 HSM #2 Secure Management Server Secondary Site Direct Load Balancing Automatic Synchronization* (All devices designated as Production within group) Remote Access Device
  • 18. Exceptional Support  TR-39-certified and PCI Subject Matter Experts  24x7x365 Business Critical support  Exceptional Support Services • Training (virtual or onsite) • Customized consulting • Hosted solutions • Certificate authority • Hosted HSMs for development and testing • Customized solution development Services to Look For in an HSM Provider
  • 19. In Summary… What to ask for when selecting HSMs • Is the solution comprehensive? • Is the solution manageable (i.e., will you be able to pass audits easily)? • Is the solution scalable? • Does the vendor’s support team have expertise in industry compliance requirements? 19
  • 20. Thank You! 20 Greg Stone Sr. Solutions Architect gstone@futurex.com Ryan Smith Chief Solutions Architect rsmith@futurex.com Booth #708

Editor's Notes

  • #2: About me20+ years in information systems, engineering and systems design10+ years in Payments & Security5+ years as Solutions Architect at Futurex
  • #3: Don’t over elaborate on any one topic, keep this broad and quick
  • #4: Futurex has a broad perspective of the industry as we supply hardware security solutions for nearly all aspects of a card transaction.Don’t just read line by line, provide a description of this adding experience.
  • #5: Emphasize that a Secure Cryptographic Device as defined by PCI is an HSM with FIPS 140-2 Level 3 and PCI HSM certification.Accredited Standards Committee X9 (ASC) standards can be found at www.x9.org.Dual Control with Split Knowledge - Process of utilizing two or more separate entities (usually persons) or mechanisms operating in concert to protect sensitive functions or information such that no entity has knowledge of nor can derive the protected information as a whole. This information may be cryptographic keys or other information used to protect underlying cryptographic keys.
  • #6: HSMs are SCDs, used to protect keys
  • #7: HSMs are SCDs, used to protect keys
  • #8: Understanding typical attack vectors in a card transaction helps us to understand the role of the HSM
  • #9: Understanding typical attack vectors in a card transaction helps us to understand the role of the HSM
  • #12: Issuer scripts can also be updated, and the HSM is used to mac (sign) these scripts and encrypt if they contain sensitive dataInsert into terminal - chip and terminal perform risk assessment - defined by EMV tags/profile by issuerDynamic cryptogram created passed to issuer through acquirer and brandsIssuer validates and may send response cryptogram to chip so chip can auth the issuerMA between chip and issuerARPC is generally not performed because card is removed by time response arrivesChanges to terminal, messaging and authorization process3 components on card - chip os, each card vendor sell os to issue (prop or open) Multos is openEMV is a broad set of standards with many optionsEach brand has slightly diff implementation for contactless and contactVISA paywave, VSDC for contact MC PayPassWhat form of verification - online or offline - stab at time of personalization of the chipThe terminal is like the chip - every terminal has own os, each vendor has implemented an EMV kernel - baseline logic required to accept EMV cards, each model of terminal has to be certified by EMVco.
  • #15: Tactical Benefits of Remote KeySignificantly quicker replacement of keysDecreased cost for replacement of keysReduced cost of TR-39 audit preparationStrategic Benefits of Remote KeyOn-demand replacement for compromised keysEasier key management Increased security during key replacementCardholder data to be encrypted is PAN, cardholder name, service code, expiration date, which is defined by PCI DSS.Sensitive authentication data is full mag stripe, CAV2/CVC2/CVV2/CID, PIN, encrypted PIN blockBDK = Base Derivation KeyKSN = Key Serial NumberDIK = DUKPT Initial Key
  • #18: Remote AccessHigh AvailabilityCentralized AdministrationHigh Capacity Secure StorageSecure Connections
  • #21: Say my name again to encourage questions, invite them to the booth, tell them Ryan will be there to.