Re: (getting off topic) Re: ATM card pins

New Message Reply About this list Date view Thread view Subject view Author view

Bodo Moeller (Bodo_Moeller@public.uni-hamburg.de)
Sat, 8 Aug 98 03:35 +0200


Rabid Wombat <wombat@mcfeely.bsfs.org>:

> My knowledge is US-centric, but AFAIK, PINs have been centrally
> authenticated for quite a long time (here in US), due to the risks
> associated with storing the PIN on the card. [...]
> Your PIN is probably safer than your signature [...] I doubt your
> signature is checked closely, and possibly not checked at all.

If the signature isn't yours, you can demonstrate to the bank (or,
should it become necessary, to a judge) that it isn't. In contrast to
that, if someone uses your PIN, the bank can be expected to insist
that this someone must have been you. Don't forget that for a
criminal who finds a lost purse (or a pick-pocket who is most
interested in cash), an ATM card is basically a free lottery ticket.
   In Germany, most courts have accepted the banks' reasoning: The
mere fact that the transactions succeeded supposedly proves (as a
"prima-facie" proof -- i.e., a first indication, which is regarded as
sufficient to determine the case if nothing else is known for sure)
that either the ATM card owner performed the questionable transaction
himself, or that he noted his PIN somewhere where the pick-pocket who
took his ATM card could find it -- both possibilites meaning that the
card owner is responsible for the damage, which in some cases amounted
to as much as 10,000 DEM (ca. $ 6,000).
   I'd be interested in hearing how such disputes are handled in the
U.S.. As that's far off topic for this list, consider sending me
private e-mail for reports on that.

It probably can be assumed that all large-scale ATM systems (e.g., the
European "eurocheque logo" ATM cards; the world-wide Cirrus/Maestro
and Plus networks; and credit card ATM withdrawals) rely on
online PIN verification: The relevant data from the magnetic stripe
together with the amount of the transaction and the PIN entered by the
customer is sent -- hopefully, using strong encryption -- to the
appropriate authorization centre, where the PIN (and the account
balance) can be checked; the centre authorizes the transaction if
everything is O.K. and says "no" otherwise (e.g., when three incorrect
PINs have been tried previously). On a local scale, other PIN
verification schemes are possible; e.g., keyed PIN derivation from the
data on the card (wich has the disadvantage that the same secret key
must be known to several ATMs, embedded in some security module).

Here in Germany, the first ATMs were installed in 1981. Back then,
PIN verification was always done offline. (Thus, by resetting the
incorrect-PIN counter on the magnetic stripe, three more guesses at a
different ATM became possible -- and, if necessary, another three at
the next ATM, etc.) Until some years ago, at least some ATMs were
occasionally operated offline.
   One common scheme for PIN generation was defined (although not all
banks used it): A DES plaintext formed from the account number and
similar data contained on the magnetic stripe was encrypted under a
DES key known only to the respective bank; the PIN was then extracted
from the resulting ciphertext according to certain rules.
   For PIN _verification_, one common DES key was known to all offline
ATMs. The PIN encryption scheme used for this purpose basically
amounts to using the account number etc. as an IV for a one-block CFB
encryption (the encrypted four-digit PIN was stored on the magnetic
stripe) with some brain-damaged changes to the usual CFB
computations. (ATMs of the bank which issued the card could
alternatively employ the PIN _generation_ scheme for verification,
using the bank's key.)

Most customer's PINs staid the same all the time, but starting in
1997, the whole scheme is being changed. Now, no encrypted PIN is
stored on the magnetic stripe. Also, everyone either already has a
new PIN (hopefully created by a more secure algorithm than before) or
will get it this year or in 1999. The old scheme had several
weaknesses:

* The brain-dead PIN generation/verification algorithms used a
   primitive conversion from hex digits (as included in the DES
   output) into decimal digits: 0 -> 0, ..., 9 -> 9, A -> 0,
   B -> 1, ..., F -> 5. While the hex digits in the DES output are
   reasonably equally distributed, the decimal digits resulting from
   this conversion obviously aren't. For the PIN system as originally
   described (where the PIN should be stored encrypted under three
   different DES keys, presumable in order to facilitate changing one
   of the keys [which never happened]), this meant that the success
   probability for guessing the PIN of a random card in three attempts
   could be improved to about 1 : 150, whereas it should be 1 : 3333
   in a well designed system.

* DES keys are much too insecure. In 1981, attacking them may have
   been infeasable. But this argument is definitely not valid for the
   nineties: For a brute force key search, you'd need the data
   (magnetic stripe data and PINs) of only five different cards --
   which is easy to obtain -- and an appropriately fast search engine.
   Large criminal organizations could have built one. Also, there
   surely were Eastern intelligence agencies with the needed
   equipment; and it is known that Russia has severe problems at
   paying wages to governmental employees -- the possible connection
   should be obvious.

* Because the keys must be present at lots of ATMs, they can
   relatively easily be leaked. Also, they possibly could be
   retrieved from security modules of, e.g., stolen ATMs -- most bits
   remain intact after power-off (see one of Ross Anderson's papers
   for practical experience with this).

* And, even for a pure offline PIN verification scheme, everything
   hinges on the security measures at the PIN generation/authorization
   centres. The brain-dead PIN scheme design is not at all
   reassuring regarding the competence of those responsible for the
   security of all this ...

Now that this old system is obsoleted, neither a common PIN generation
algorithm nor a commond PIN verification algorithm is defined
(verification is only possible online, unless a bank still uses
card-data-derived keys for its own customers). However:

* Some banks are still doing utterly stupid things:
   - At one bank (in Berlin, I think), the ATMs accepted _arbitrary_
      PINs. (This was in 1997, if I rember correctly.)
   - One large bank (Commerzbank or Dresdener Bank) gave all its
      customers new PINs in 1997, and at most a few weeks later, gave
      them all new PINs again -- the earlier new PINs were "not as
      secure as intended", it was explained (no further details were
      given; maybe they again used the old hex -> decimal map).

* Most new Germany ATM cards not only have a magnetic stripe,
   but are also smart-cards. (By "ATM cards", I mean eurocheque cards
   and compatible bank cards -- usable, amongst other things, at ATMs
   and also as a debit card for paying in stores [POS = point of
   sale], using the PIN for authentication.) While, since 1997, no
   PIN information is contained on the magnetic stripe, the PIN is now
   stored on the chip in order to allow offline POS. This provides a
   new goal for attacks (note that the attacker may destroy the chip,
   because the magnetic stripe is enough for ATMs).

 
> The bigger security risk (in the US, anyway), seems to be being abducted
> and taken to a cash machine and forced to withdraw cash. For this reason,
> it is best to keep a seperate "card account", and keep only a small
> amount of cash in it. Keep the rest in another account, which is not
> card-accessible.

This security measure wouldn't work in Germany because most account
owners are granted three month's earnings as credit at their normal
bank accounts. Also, the bank can accept further withdrawals that
violate such limits.


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:10:56