Preplay Attack on Chip and PIN
Interesting research paper on a bank card chip-and-PIN vulnerability. From the blog post:
Our new paper shows that it is possible to create clone chip cards which normal bank procedures will not be able to distinguish from the real card.
When a Chip and PIN transaction is performed, the terminal requests that the card produces an authentication code for the transaction. Part of this transaction is a number that is supposed to be random, so as to stop an authentication code being generated in advance. However, there are two ways in which the protection can be bypassed: the first requires that the Chip and PIN terminal has a poorly designed random generation (which we have observed in the wild); the second requires that the Chip and PIN terminal or its communications back to the bank can be tampered with (which again, we have observed in the wild).
AndrewJ • May 20, 2014 7:41 PM
It’s interesting that here in Australia the Visa website states that “The chip prevents the card from being counterfeited..” [1]. However most of the bank websites don’t go quite so far: “A security chip credit card is more secure than one with just a magnetic stripe on the back of the card, because it is more difficult for someone to fraudulently copy your card.” [2] and also similar comments at [3].
I’m guessing the legal liability for Visa is much less than for the banks. And I haven’t heard of too many issues (yet) in Australia related to cloning EMV cards, so the banks must be settling these out of court to prevent the kind of analysis and loss of confidence as has happened in the UK and Europe.
[1] http://www.visa.com.au/personal/security/chipcards.shtml
[2] http://www.anz.com/personal/credit-cards/security/chip-cards/
[3] https://www.commbank.com.au/support/faqs/576.html