HSM Use Cases: Payshield Certification Course Q1 2020
HSM Use Cases: Payshield Certification Course Q1 2020
Acquirer Issuer
Merchant Cardholder
Personalization
ATM and POS
Bureaus
Terminal vendors
Card Printer
HSM Vendors
Manufacturer
Payment Ecosystem – Objectives
Card Schemes & Payment Networks
Processors
Examples
Authorize.net
Examples
Chase Paymentech eFunds/FIS
Cybersource Star Processing Inc.
Google Checkout U.S. Bancorp
iPayments
PayPal
PayWare Connect
The Logic Group
WorldPay
...
Chip & Card Manufacturers
Chip Manufacturers Card Manufacturers
Role Role
Design, manufacture, and provide ICs which are Produce smart cards from sheets
integrated on inlays and/or cards
Develop OS and card applications
Normally will load the operating system (OS) of
the chip Test the cards for quality issues
Package, ship, and distribute the cards to
personalization bureau
Examples
Hitachi Examples
Infineon Technologies AustriaCard
INSIDE Secure CPI Card Group
NXP Semiconductors Gemalto
Samsung Giesecke & Devrient
Sony Morpho Cards
STMicroelectronics Oberthur Technologies
Perso Equipment Vendors / Perso Bureaus
Card Printer / Perso HW Vendors Perso Bureau
Role Role
Manufacture and supply card printers/ Fulfillment of personalized chip card, with all paper inserts;
personalization machines providing preparation for mailing to customer
Color and graphics printing
Provide personalization services (optionally also data preparation)
Embossing
Magnetic-stripe encoding Partner with issuers to:
Chip personalzation Define card profile, including risk parameters
Laser engraving Receive and manage card records and keys to form a record
Lamination Generate personalization script
May provide personalization software or not Perform key management activities for EMV, CVV/CVC, and PINs between card
manufacturer and personalization bureau and between issuer and personalization
bureau
Examples Examples
Atlantic Zeiser / Böwe-CardTec AustriaCard Fiserv
CIM ABNote Gemalto
Datacard
CPI Card Group Giesecke & Devrient (G&D)
Matica
First Data Oberthur Technologies
Mühlbauer
NBS Technologies FIS TSYS
ATM, POS Terminal, and mPOS Vendors
ATM Manufacturers POS Terminal Vendors mPOS Vendors
Role Role Role
Manufacture and provide ATM
Manufacture and provide Develop and provide mPOS
terminals and other self-service
banking equipment standalone POS terminals and apps running on mobile
integrated EMV card readers devices (smartphones, tablets)
For EMV
For EMV Develop and provide secure
Upgrade ATMs to support contact and/or
contactless EMV chip transactions
card readers to attach to
EMV-compliant hardware and operating
system platforms mPOS device
Hardware and software certified for EMV
acceptance Maintain GlobalPlatform standards .” 8,4m readers shipped in 2013...“
Examples Examples
Diebold
Examples Creditcall
NCR MagTek Handpoint
Triton Ingenico iZettle
Wincor-Nixdorf Verifone Jusp
LifePay
...
mPowa
PayLeven
Square
SumUp
...
Other Use Cases
Security Requirements
User authentication
Secure PIN processing (“end-to-end” protection requirement)
Card authentication
Transaction authentication
Data confidentiality
Cryptographic key management…
2 3
1 2 IB
S2
Each connected pair of entities shares a
Switch 2 Issuer B
Common key to form a key zone
PIN operations Message Authentication operations
1. PIN Encryption 1. MAC Generation
2. PIN Translation 2. MAC Translation (Generation/Verification)
3. PIN Decryption & Verification 3. MAC Verification
Card Issuance
Card Management, Data Preparation, Card Personalization
Applications
Production & personalization of smart cards & secure documents
Card types & environments:
Payment Cards (EMV & mag-stripe credit/debit cards), Fuel/Fleet Cards
eID/e-Passport Documents
eHealth Cards
Telco/SIM Cards
Loyalty/Gift Cards
Corporate ID Cards
Online Banking & Authentication Cards & Tokens
Personalization data includes private user information (PAN, PIN), keys, and certificates
HSM Usage
Data Preparation: Server side key, PIN, certificate generation for injection into smart card
Personalization: Encrypted communications (Secure Messaging) with smart card for chip encoding
High speed/throughput key generation/derivation – may do thousands of cards per hour
High availability – cannot tolerate stoppage of automated card processing equipment
Adherence to relevant standards: EMV, ANSI, ZKA, APCA, GlobalPlatform, ICAO, …
Certifications: FIPS 140-2 Level 3, PCI-HSM
Card Issuance – Central Back Office
Issuer Card Application
Management System
Data Preparation System
Bank Encrypted
File(s) Personalizer / Personalization Bureau
Personalization System
Government HSM KEK
Chip Manufacturer
KEK
HSM KMC
Card Manufacturer Card Production System
OS + OS +
App
Card
Application KMC
HSM
Instant Issuance at Branch
HSM
PIN Mailing / Key Mailing
HSM Features
HSM directly attached to printer
PINs never exposed in clear form (outside
of protected HSM environment)
HSM generates and prints PINs to PIN
Mailers
Support of PIN mailer layouts in postscript
format (up to 10 )
PIN printing in words
USB & serial printing
Separate PIN mailer user rolers
Extensive auditing
OTP with EMV Card
Chip Authentication Program (EMV-CAP)
Payment Card as General-purpose, Secure Authentication
Device
Authentication Process
Payment card inserted into stand-alone reader
Cardholder authenticates to the chip with PIN entered on the reader
(not interceptable)
Card produces One-time Password (OTP), not susceptible to “phishing” attacks
Any chip card loaded with standard MasterCard M/Chip or Visa VSDC payment
application or stand-alone CAP/DPA card
3D-Secure Components
MPI – Merchant Server Plug-In processes payment messages
ACS – Access Control Server
Issuing application requiring FIPS 140-2 Level 3 HSM.
CAVV – Authentication code for card generated by HSM
Authenticates cardholder, merchant, and transactions
Contactless Payments
Contactless Cards
Simpler way to pay, higher convenience, speed
2 offerings:
Contactless / (EMV) Chip
Usually dual interface card (contact and contactless
Uses standard EMV authentication technologies (SDA/CDA)
Low-value payments, approved offline by both card and terminal
(for fast transactions)
Contactless / Mag-Stripe
Meaning: for magnetic-stripe payment infrastructures
Potentially other form factors (key fob, watch)
Online Payments
New authentication mechanism: Dynamic CVV
(CVC3 / dCVV)
Mobile Payments
NFC Mobile Payments
“Payment Card“ ( ) on mobile phone
NFC used for communications (up to 10 cm distance)
Payment app resides in SE (Secure Element) on mobile
UICC, MicroSD, Integrated Chip
Technologies:
Network segmentation
Tokenization reduce PCI scope SAD must not be stored !
Encryption
Point-to-point encryption (P2PE)
What is PCI P2PE?
“A point-to-point encryption (P2PE) solution is provided by a third party solution provider, and is a
combination of secure devices, applications and processes that encrypt data from the point of
interaction (for example, at the point of swipe or dip) until the data reaches the solution provider’s
secure decryption environment.”
Encrypts sensitive cardholder data at the earliest opportunity – directly within the PED/terminal
Cardholder data
encrypted
directly at
terminal FIPS 140-2 L3 or PCI-HSM certified HSM
is required by P2PE decryption provider
https://www.pcisecuritystandards.org/documents/P2PE_v1_1_FAQs_Aug2012.pdf
Technologies for P2PE
DUKPT
Derived Unique Key Per Transaction (DUKPT): a key management scheme used
extensively in the payments world, especially for POS transactions
ANSI Standard defined under X9.24
DUKPT is a key management standard, not an encryption standard
Provides a way of generating unique, per-transaction specific PIN encryption, MAC,
and data encryption keys (for P2PE) without the need to store large volumes of keys
DUKPT functions are provided by payment HSMs
Internet
Typical internet security from the browser to web server is SSL, terminated at the web server
End-to-end encryption, browser to host, provides totally secure online transactions - end-to-
end PIN / password protection
RSA encryption at client with Java applet – HSM decryption and verification at host
Supports numeric (card) PINs and (alphanumeric) passwords (4-30 characters)
PIN/password change option
Online PINs can be converted to card PINs for processing by Card Payment (Authorization)
System
OBM Components
OBM Java applet and/or JavaScript module
Java/JS code to encrypt the Password/PIN at the browser
Support for all common web browsers:
IE, Firefox, Chrome, Safari, Opera
Samples
HTML code to make use of the Applet
Thank you.