Preview

Plastic Money

Powerful Essays
Open Document
Open Document
7448 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Plastic Money
Securing Plastic Money Using an RFID Based Protocol Stack
Rishab Nithyanand
Department of Computer Science
University of California - Irvine rishabn@uci.edu Abstract. Since 2006, there have been three major systems that have been implemented in an attempt to reduce the threat of credit card fraud - Chip and PIN (United Kingdom), Chip Authentication Program
- CAP (European Union), and RFID enabled credit cards (United States of America). In spite of a big effort by the EMV1 , there has been little evidence to demonstrate the success of these schemes in stopping fraudsters, scammers, and identity thieves. This may be attributed to combinations of poor usability, lack of trusted interfaces, the absence of smart-card cryptography that takes full advantage of the available computation resources, and inadequate authentication protocols. In this paper, we explain the shortcomings and vulnerabilities of each of these systems, and then explain requirements of a secure and usable cashless payment system. We also describe a new RFID based protocol stack - SECAPS (Secure Cashless
Payment System), which obviates many of the attacks on the current schemes by using the newly available computation resources on modern RFID Tags.

1

Introduction

Credit and debit cards have long been accepted as a convenient alternative to carrying wads of cash in a wallet. However, while it has been accepted by the public, credit card fraud has been a rather expensive problem that has plagued societies around the world for more than a decade. Statistics from the United Kingdom alone indicate losses of over £609 million in 2008 due to card fraud [1]. There has been some significant effort over the last few years by the EMV to quell this problem, such as introducing the Chip and PIN in the United Kingdom in 2006 [2], RFID enabled credit cards in the
United States in 2006 [3], and the Chip Authentication Program in the European Union in 2007 [4].
1.1

Types of Credit Card



References: APACS - The UK Card Payments Association: Fraud - The Facts 2009. (2009) APACS - The UK Card Payments Association: Chip and PIN Guide for Retailers Schwartz, J.: Researchers See Privacy Pitfalls in No-Swipe Credit Cards. New York Times. (2006) Layden, J.: Barclays Deploys PINsentry to Fight Fraud Gilmore, G.: Card Details For Sale Online. Times Online, UK. (2008) Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O’Hare, T.: Vulnerabilities in first-generation rfid-enabled credit cards. In: Financial Cryptography. (2007) Adida, B., Clulow, J., Lin, A., Murdoch, S., Anderson, R., Rivest, R.: Phish and chips (traditional and new recipes for attacking emv). (2006) Adida, B., Clulow, J., Lin, A., Anderson, R., Rivest, R.: A note on emv secure messaging in the ibm 4758 cca Lazarony, L.: On the Dark Side of Credit Card Fraud. Bankrate.com. (2002) Cherry, P.: Fetching Fraudsters are Looking to Rip You Off, SQ Warns OnlyFinance.com: Three Brothers Jailed for Card Fraud. (2009) Lineman, D.: Fake ATM Readers Steal Your Bank Card and PIN Matyas, V., Cvrcek, D., Krhovj, J., Kumpost, M.: Authorizing card payments with pins. Computer 41(2) (2008) 64–68 Kirk, J.: Security Analyst: Las Vegas ATMs May Have Malware. PC World. (2009) Blythe, S.: Method to Detect Man-in-the-Middle (MITM) or Relay Attacks, USPTO Application No.: 20090168997. (2009) Anderson, R., Bond, M.: The man-in-the-middle defence Hancke, G.: A practical relay attack on iso 14443 proximity cards. (2005) 22 23. Adams, A., Sasse, M.A.: Users are not the enemy. Volume 42., New York, NY, USA, ACM (1999) 40–46 24 The Netherlands, Elsevier Science Publishers B. V. (1993) 53–59 25 Annual International Cryptology Conference on Advances in Cryptology, London, UK, Springer-Verlag (1990) 44–63 26 for untrustworthy environments. In: SOUPS ’07: Proceedings of the 3rd symposium on Usable privacy and security, New York, NY, USA, ACM (2007) 169–170 for RFID Applications. In: Workshop on RFID Security – RFIDSec’06, Graz, Austria, Ecrypt (July 2006) 30 31. Leyden, J.: Technical Problems Mar Barclay’s PINSentry Roll-Out. The Register, UK. (2007) 32 33. Infineon Technologies AG.: SLE 66CLxxxPE Contactless and Dual Interface Controller Family. (2009) 34 35. SkyeTek, Inc.: Data Sheet - SkyeTek SkyeModule M1 - Mini. (2009) 36 37. Blake-Wilson, S., Menezes, A.: Authenticated diffie-hellman key agreement protocols. In: SAC ’98: Proceedings of the Selected Areas in Cryptography, London, UK, Springer-Verlag (1999) 339–361 USA, ACM (2006) 199–203 39 (2004) 425–430

You May Also Find These Documents Helpful

  • Powerful Essays

    Advanced technology in electronic payment system allows money be transformed from traditional currency to newer forms including credit card, debit cards, electronic cheque, and electronic transactions using computing and communications devices. All kinds of secure…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Dexit Analysis

    • 1112 Words
    • 5 Pages

    Fast 3 second transactions via RFID would create simple convenient transactions that could be tracked easily by consumers.…

    • 1112 Words
    • 5 Pages
    Good Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 593 Words
    • 3 Pages

    There are many different types of payment systems, but the four major ones are Online Credit Card Payment System, Online Electronic Cash System, Electronic Check System and Smart Cards based Electronic Payment System. The key advantages to these systems vary from privacy, integrity, compatibility, good transaction efficiency, acceptability, convenience, mobility, low financial risk and anonymity, compared to the traditional method of payment systems. There are some feared concerns with the credit card system such as lack of authentication, repudiation of charges and credit card frauds, and also having to reveal credit information at…

    • 593 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    Credit Card Fraud is one of the biggest threats to business establishments today. Originally, credit cards simply carried raised numbers that were transferred to a carbon copy with a card-swiping machine. The merchant simply accepted any card presented. Spending limits and printed lists of lost/stolen cards were ineffective in preventing fraud and other financial losses. Merchants were required to telephone a transaction authorization center to get pre-approval of the transaction. The volume of telephone traffic grew too great, and more automated authorization systems allowed faster, easier, and verified transactions. Magnetic stripes on the backs of these payment cards started to appear and that allowed computers to be used at both ends of the call.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As Target continues to respond to the security breach that has now been estimated to affect up to 110 million people by NBC News.com, analysts continue to zero in on the statements and actions by CEO, Gregg Steinhafel. And positively so. In the Wall Street Journal article titled, “Target Tried Antitheft Cards,” authors Paul Ziobro and Robin Sidel highlight statements now being made by Steinhafel and actions taken in the past concerning chip-based credit cards. Although the article states that Target pulled the plug on a $40 million, three-year program proposed to better protect shoppers a decade ago, it is apparent that Target may not be to blame.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Near-Field Communication

    • 1117 Words
    • 5 Pages

    “The war of the ‘wallets’ is escalating”, according to Wall Street Journal. Google and Verizon Wireless, the Internet and Wireless “Giants” respectively, are in a foot race to see who can make industry standard, one of the newest mobile technologies, called Near-Field Communications or NFC. The technology can potentially replace credit/debit cards, or in some cases wallets entirely, for today’s consumers. “The payment system can allow Google to offer retailers more data about their customers and help retailers target ads and discount offers to mobile-device users near their stores.”…

    • 1117 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    [12] Ravindra Kumar Chahar and et.al., “ Design of a new Security Protocol”, IEEE International Conference on…

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Elliptic Curve Cryptography

    • 6355 Words
    • 26 Pages

    [3] K. Araki, S. Miura, and T. Satoh. Overview of elliptic curve cryptography. In International Workshop on Practice and Theory in Public Key Cryptography, pages 1-14, 1998.…

    • 6355 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Reinert, Lawrence A, Luther, Stephen C (1998), Authentication Protocols for Smart Cards, National Security Agency, Department of Defense, USA.…

    • 3876 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    The idea of a single smart card to be used for multiple services has been around for years.…

    • 4969 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Rfid Based Security System

    • 4761 Words
    • 20 Pages

    As the RFID tags are getting cheaper, it is a very economical solution to all the security system needed [1].…

    • 4761 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Organizations have been experimenting with smart cards for almost thirty years, yet they are not used particularly in the North American market. Smart cards offer exciting possibilities for convenience, accuracy, customization, data security and cost reduction for individuals and organizations.…

    • 3339 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    Information security plays a pivotal role during internet communication in today’s era of technology. It is tremendously important for people committing etransactions. For naïve people it may seem to be not that necessary orincreased security may provide comfort to paranoid people but the truth is that it is absolutely essential when communication is carried between tens of millions of people daily. There are various cryptography methods that provide a means for secure commerce and payment to private communications and protecting passwords. Cryptography is necessary for secure communications; it is not by itself sufficient. The reader of this paper will find variants of cryptography and their applications. This paper has two major purposes. The first is to provide some real examples of cryptography in use today. The second is to provide tabular summarization and conclusion. Curious readers should check out some of the web pages and pdf in the bibliography below for further detailed — and interesting! — background information.…

    • 2044 Words
    • 9 Pages
    Powerful Essays