Preview

Plastic Money

Powerful Essays
Open Document
Open Document
7448 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Plastic Money
Securing Plastic Money Using an RFID Based Protocol Stack
Rishab Nithyanand
Department of Computer Science
University of California - Irvine rishabn@uci.edu Abstract. Since 2006, there have been three major systems that have been implemented in an attempt to reduce the threat of credit card fraud - Chip and PIN (United Kingdom), Chip Authentication Program
- CAP (European Union), and RFID enabled credit cards (United States of America). In spite of a big effort by the EMV1 , there has been little evidence to demonstrate the success of these schemes in stopping fraudsters, scammers, and identity thieves. This may be attributed to combinations of poor usability, lack of trusted interfaces, the absence of smart-card cryptography that takes full advantage of the available computation resources, and inadequate authentication protocols. In this paper, we explain the shortcomings and vulnerabilities of each of these systems, and then explain requirements of a secure and usable cashless payment system. We also describe a new RFID based protocol stack - SECAPS (Secure Cashless
Payment System), which obviates many of the attacks on the current schemes by using the newly available computation resources on modern RFID Tags.

1

Introduction

Credit and debit cards have long been accepted as a convenient alternative to carrying wads of cash in a wallet. However, while it has been accepted by the public, credit card fraud has been a rather expensive problem that has plagued societies around the world for more than a decade. Statistics from the United Kingdom alone indicate losses of over £609 million in 2008 due to card fraud [1]. There has been some significant effort over the last few years by the EMV to quell this problem, such as introducing the Chip and PIN in the United Kingdom in 2006 [2], RFID enabled credit cards in the
United States in 2006 [3], and the Chip Authentication Program in the European Union in 2007 [4].
1.1

Types of Credit Card



References: APACS - The UK Card Payments Association: Fraud - The Facts 2009. (2009) APACS - The UK Card Payments Association: Chip and PIN Guide for Retailers Schwartz, J.: Researchers See Privacy Pitfalls in No-Swipe Credit Cards. New York Times. (2006) Layden, J.: Barclays Deploys PINsentry to Fight Fraud Gilmore, G.: Card Details For Sale Online. Times Online, UK. (2008) Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O’Hare, T.: Vulnerabilities in first-generation rfid-enabled credit cards. In: Financial Cryptography. (2007) Adida, B., Clulow, J., Lin, A., Murdoch, S., Anderson, R., Rivest, R.: Phish and chips (traditional and new recipes for attacking emv). (2006) Adida, B., Clulow, J., Lin, A., Anderson, R., Rivest, R.: A note on emv secure messaging in the ibm 4758 cca Lazarony, L.: On the Dark Side of Credit Card Fraud. Bankrate.com. (2002) Cherry, P.: Fetching Fraudsters are Looking to Rip You Off, SQ Warns OnlyFinance.com: Three Brothers Jailed for Card Fraud. (2009) Lineman, D.: Fake ATM Readers Steal Your Bank Card and PIN Matyas, V., Cvrcek, D., Krhovj, J., Kumpost, M.: Authorizing card payments with pins. Computer 41(2) (2008) 64–68 Kirk, J.: Security Analyst: Las Vegas ATMs May Have Malware. PC World. (2009) Blythe, S.: Method to Detect Man-in-the-Middle (MITM) or Relay Attacks, USPTO Application No.: 20090168997. (2009) Anderson, R., Bond, M.: The man-in-the-middle defence Hancke, G.: A practical relay attack on iso 14443 proximity cards. (2005) 22 23. Adams, A., Sasse, M.A.: Users are not the enemy. Volume 42., New York, NY, USA, ACM (1999) 40–46 24 The Netherlands, Elsevier Science Publishers B. V. (1993) 53–59 25 Annual International Cryptology Conference on Advances in Cryptology, London, UK, Springer-Verlag (1990) 44–63 26 for untrustworthy environments. In: SOUPS ’07: Proceedings of the 3rd symposium on Usable privacy and security, New York, NY, USA, ACM (2007) 169–170 for RFID Applications. In: Workshop on RFID Security – RFIDSec’06, Graz, Austria, Ecrypt (July 2006) 30 31. Leyden, J.: Technical Problems Mar Barclay’s PINSentry Roll-Out. The Register, UK. (2007) 32 33. Infineon Technologies AG.: SLE 66CLxxxPE Contactless and Dual Interface Controller Family. (2009) 34 35. SkyeTek, Inc.: Data Sheet - SkyeTek SkyeModule M1 - Mini. (2009) 36 37. Blake-Wilson, S., Menezes, A.: Authenticated diffie-hellman key agreement protocols. In: SAC ’98: Proceedings of the Selected Areas in Cryptography, London, UK, Springer-Verlag (1999) 339–361 USA, ACM (2006) 199–203 39 (2004) 425–430

You May Also Find These Documents Helpful

  • Powerful Essays

    Dexit is a new electronic payment system that designs for low-value transactions. Based on Radio Frequency Identification (RFID) technology, customers can use a small electronic tag to pay for goods and services without entering password on a specialized reader at the retail stores, which is obviously faster than any other payment methods, such as cash, debit cards and credit cards. With this high reliable and convenient payment system, customers can save much time on waiting queues and eliminate the troubles for carrying loose coins and exact change for small-money purchases. In addition, merchants will also benefit a lot from Dexit to increase their revenues by improving cashier efficiency, decreasing the cash-handing costs, reducing cash counting and depositing charges, as well as avoiding the bothers on checking for counterfeit money.…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 593 Words
    • 3 Pages

    There are many different types of payment systems, but the four major ones are Online Credit Card Payment System, Online Electronic Cash System, Electronic Check System and Smart Cards based Electronic Payment System. The key advantages to these systems vary from privacy, integrity, compatibility, good transaction efficiency, acceptability, convenience, mobility, low financial risk and anonymity, compared to the traditional method of payment systems. There are some feared concerns with the credit card system such as lack of authentication, repudiation of charges and credit card frauds, and also having to reveal credit information at…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 7 Checkpoint It 205

    • 694 Words
    • 3 Pages

    Many of us have become accustomed to electronic payment systems. These systems will continue to increase as businesses and banks present more opportunities to use them.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As Target continues to respond to the security breach that has now been estimated to affect up to 110 million people by NBC News.com, analysts continue to zero in on the statements and actions by CEO, Gregg Steinhafel. And positively so. In the Wall Street Journal article titled, “Target Tried Antitheft Cards,” authors Paul Ziobro and Robin Sidel highlight statements now being made by Steinhafel and actions taken in the past concerning chip-based credit cards. Although the article states that Target pulled the plug on a $40 million, three-year program proposed to better protect shoppers a decade ago, it is apparent that Target may not be to blame.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    [12] Ravindra Kumar Chahar and et.al., “ Design of a new Security Protocol”, IEEE International Conference on…

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Elliptic Curve Cryptography

    • 6355 Words
    • 26 Pages

    [4]Elliptic curve cryptosystems on smart cards Elsayed Mohammed, A. E. Emarah and 0. El-Shennawy, Senior Member IEEE…

    • 6355 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Near-Field Communication

    • 1117 Words
    • 5 Pages

    “The war of the ‘wallets’ is escalating”, according to Wall Street Journal. Google and Verizon Wireless, the Internet and Wireless “Giants” respectively, are in a foot race to see who can make industry standard, one of the newest mobile technologies, called Near-Field Communications or NFC. The technology can potentially replace credit/debit cards, or in some cases wallets entirely, for today’s consumers. “The payment system can allow Google to offer retailers more data about their customers and help retailers target ads and discount offers to mobile-device users near their stores.”…

    • 1117 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Rfid Based Security System

    • 4761 Words
    • 20 Pages

    As the RFID tags are getting cheaper, it is a very economical solution to all the security system needed [1].…

    • 4761 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    E Wallet

    • 3634 Words
    • 15 Pages

    Rebbeck, T South Korea and Japan show the way on mobile payment and banking. Analysys Research.Apr. 2006.http://research.analysis.com./articles/standardarticles.asp?iLifeArticle=2100. Chaum, D. and Brands, S. Minting electronic cash. IEEE Spectrum, 34(2):30-34, feb 1997. Chaum, D., Fiat, A., and Naor, M. Untraceable electronic cash. Prpceedings of 8th annual international Cryptology Conference (CRYPTO), Santa Barbara, CA, Aug. 1989. Horn, G. and Preneel, B. Authentication and payment in future mobile systems. Journal of Computer Security, 8(2-3): 183-207, Aug 2000. Kungpisdan, S., Srinivasan, S., and Le, B. P. D. A secure account-based mobile payment protocol. Proceedings of International Conference on Information Technology: Coding and Computing, Las Vegas, VN, Apr. 2004. Wayner, P. Digital Cash: Commerce on the Net. Academic Press, San Diego, CA, Mar 1997. 2 Sub Edition. Gray, J.N., Notes on DataBase Operating Systems, Operating Systems: An Advances Course, Springer-Verlag, 1979, New York, pp.393-481. Moss, Elliot, Nested Transactions : An Approach to Reliable Distributed Com puting, The MIT Press, Cambridge, Massachusetts, 1985, pp.31-38. Singhal, M. and Shivaratri, N., Advanced Concepts in Operating Systems, McGraw-Hill, 1994, pp. 302-303, pp. 334-335, p. 337 Michael L., PGP & GPG: email for the practical paranoid, Oreilly, Apr. 2006.…

    • 3634 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    The idea of a single smart card to be used for multiple services has been around for years.…

    • 4969 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    3d password

    • 1383 Words
    • 6 Pages

    3-D Secure is an XML-based protocol designed to be an additional security layer for online credit and debit card transactions. It was developed by Visa with the intention of improving the security of Internet…

    • 1383 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    International Journal of Science and Technology (IJST) – Volume 1 No. 3, March, 2012 [4] http://csrc.nist.gov/publications/nistpubs/800-12/80012-html/chapter19.html [5] http://searchsecurity.techtarget.com/definition/authent ication [6] http://en.wikipedia.org/wiki/Authentication [7] http://en.wikipedia.org/wiki/Digital_signature#Digital _signatures_vs._ink_on_paper_signatures [8] http://searchsecurity.techtarget.com/definition/digitalsignature [9] https://tspace.library.utoronto.ca/bitstream/1807/1930 7/1/Zhao_Yi_200911_PhD_Thesis.pdf [10] http://www.academypublisher.com/proc/wisa09/paper s/wisa09p363.pdf [11] http://electronicsbus.com/?s=Application+Of+Crypto graphy+Include+Credit+Cards [12] http://en.wikipedia.org/wiki/Encrypting_File_System [13] http://technet.microsoft.com/en/us/library/cc700811.as px…

    • 2044 Words
    • 9 Pages
    Powerful Essays