Efficient LFSR Based Distance Bounding Protocol for Contactless EMV Payments

被引:0
作者
Shah, Trishla [1 ]
Sampalli, Srinivas [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
来源
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2 | 2019年 / 881卷
关键词
EMV; Relay; Distance bounding protocol; Contactless; LFSR;
D O I
10.1007/978-3-030-02683-7_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on relay attacks against EMV based contactless payment cards. EMV is a standard for payments via smart cards. In a typical relay attack on contactless cards, the attacker launches the attack by relaying the legitimate user's card information to another malicious device, in proximity to the verifier. This technique is used by the attacker to burglarize money from the victim's card. Designing an efficient distance bounding protocol is a promising solution to defeat relay attacks. We study the dominant payment protocols in EMV contactless cards (Visa's payWave, Mastercard's PayPass, and PaySafe) and identify the existing vulnerabilities in these protocols. A practical relay attack on the latest EMV payment protocol - PaySafe is performed. Contactless payments are fast becoming a key instrument in the payment industry, and the future technologies must aim towards convenience and security. We propose a light weight protocol that suits well with the current EMV specification. Our protocol is based on LFSR, which supports exchange of a small string of bits through a time critical channel.
引用
收藏
页码:275 / 290
页数:16
相关论文
共 17 条
[1]   Security and Privacy Implications of NFC-enabled Contactless Payment Systems [J].
Akinyokun, Nicholas ;
Teague, Vanessa .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[2]  
[Anonymous], USENIX SEC S
[3]  
Baddeley D., 1999, 1999144432 ISOIEC, P14443
[4]  
Brands D., 1993, Work-shop Theory Appl. Cryptographic Techn., P344
[5]   Relay Cost Bounding for Contactless EMV Payments [J].
Chothia, Tom ;
Garcia, Flavio D. ;
de Ruiter, Joeri ;
van den Breekel, Jordi ;
Thompson, Matthew .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 :189-206
[6]   A Survey on Near Field Communication (NFC) Technology [J].
Coskun, Vedat ;
Ozdenizci, Busra ;
Ok, Kerem .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) :2259-2294
[7]  
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[8]   Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions [J].
Deepthi, P. P. ;
Sathidevi, P. S. .
COMPUTERS & SECURITY, 2009, 28 (3-4) :229-241
[9]  
Drimer S., C 24C3 DEC
[10]  
Emms M., 2012, COMPUTING SCI