ghl systems net matrix terminal line encryption 2009 2010

53

Upload: alex-tan

Post on 05-Dec-2014

2.334 views

Category:

Documents


13 download

DESCRIPTION

NetMATRIX (Multi-Application Transaction Routing and Identification eXchange) Terminal Line Encryption - is the complete solution for banks wishing to introduce terminal line encryption into their existing POS network infrastructure.

TRANSCRIPT

Page 1: Ghl systems net matrix terminal line encryption 2009 2010
Page 2: Ghl systems net matrix terminal line encryption 2009 2010

Agenda

Page 3: Ghl systems net matrix terminal line encryption 2009 2010

PAYMENT & SECURITY TRENDS

Page 4: Ghl systems net matrix terminal line encryption 2009 2010

E2EE: What is it?

Computer Desktop Encyclopedia

“…is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…”

Page 5: Ghl systems net matrix terminal line encryption 2009 2010

E2EE: The story so far…

Smart Card Alliance Sept 2009

Page 6: Ghl systems net matrix terminal line encryption 2009 2010

KEY CONCEPTS OF TLE

Page 7: Ghl systems net matrix terminal line encryption 2009 2010

In cryptography, encryption, is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encryptedinformation (Wikipedia)

en·cryp·tion /-'krip-sh&n/

Page 8: Ghl systems net matrix terminal line encryption 2009 2010

MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message

Message Authentication

Code

Page 9: Ghl systems net matrix terminal line encryption 2009 2010

THE MALAYSIAN EXPERIENCE

Page 10: Ghl systems net matrix terminal line encryption 2009 2010

Real Tapping Threats

Page 11: Ghl systems net matrix terminal line encryption 2009 2010

Wire tapping threats

Page 12: Ghl systems net matrix terminal line encryption 2009 2010

A brief look at history…

Page 13: Ghl systems net matrix terminal line encryption 2009 2010

The Line Encryption Working Group

Page 14: Ghl systems net matrix terminal line encryption 2009 2010

Design Parameters

Page 15: Ghl systems net matrix terminal line encryption 2009 2010

Key Considerations

Page 16: Ghl systems net matrix terminal line encryption 2009 2010

MAC algorithm

ENC algorithm

Key Differentiation

Key Usage

Key Storage

ENC Data elements

2 2 4 2 43

Highest Score: 2-2-4-2-3-4

Lowest Score: 1-1-1-1-1-1

Minimum Data Encryption Requirements

Encrypted Data Elements1. CVV2. CVV and PAN / Track2

Terminal Key Storage1. Outside secure module2. Within tamper reactive module

Key Usage Methodology1. Unique-key-per-terminal2. Unique-key-per-session-per-term3. Unique-key-per-transaction4. Derived Unique Key Per Txn (DUKPT)

Key Differentiation1. Same key for ENC & MAC2. Different key for ENC & MAC

Encryption Algorithm1. TEA – Tiny Encryption Algorithm2. DES – Data Encryption Standard3. 3DES/AES

MAC Algorithm1. No MAC2. CRC32 + MAC3. CRC32 + RMAC4. SHA-1 + RMAC, or SHA-1 + AES MAC

Page 17: Ghl systems net matrix terminal line encryption 2009 2010

General Approaches

Host-based

HostHSM

NAC

NAC-based

NAC

Host

SNAC

NAC

NAC

Interception-based

NAC

NAC

NAC

Host

Page 18: Ghl systems net matrix terminal line encryption 2009 2010

THE RESULTS

Page 19: Ghl systems net matrix terminal line encryption 2009 2010

The Results…

Source: Visa VPSS Payment Security Bulettin, 2006

Page 20: Ghl systems net matrix terminal line encryption 2009 2010

The Results…

Source: Visa VPSS Payment Security Bulettin, 2006

Page 21: Ghl systems net matrix terminal line encryption 2009 2010

The Results…

Source: Visa VPSS Payment Security Bulettin, 2006

Page 22: Ghl systems net matrix terminal line encryption 2009 2010

The Results…

Source: Visa VPSS Payment Security Bulettin, 2006

Page 23: Ghl systems net matrix terminal line encryption 2009 2010

The Results…

Page 24: Ghl systems net matrix terminal line encryption 2009 2010

Payments: The story today…

Source: BNM, 2009 Financial Stability and Payment Systems Report 2008

Page 25: Ghl systems net matrix terminal line encryption 2009 2010

Payments: The story today

“…(card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”

Page 26: Ghl systems net matrix terminal line encryption 2009 2010

PAYMENT SECURITY MYTHS

Page 27: Ghl systems net matrix terminal line encryption 2009 2010

Encryption Myths

Page 28: Ghl systems net matrix terminal line encryption 2009 2010

Summary: Considerations for TLE

Addresses all threats

Addresses Implementation issues

Addresses Deployment Issues

Addresses Administration Issues

Multi-channel & multi-device Support

Remote Key Injection

Vendor Independence

Performance

Cost-Effective

Page 29: Ghl systems net matrix terminal line encryption 2009 2010

Additional References

1. The Smart Card Alliance (http://www.smartcardalliance.org/)

2. PCI Security Standards Council

(https://www.pcisecuritystandards.org/)

3. Visa Best Practices, Data Field Encryption Version 1.0

(http://corporate.visa.com/_media/best-practices.pdf)

4. Secure POS Vendors Association

(http://www.spva.org/index.aspx)

5. GHL Systems (http://www.ghl.com/netMATRIX )

Page 30: Ghl systems net matrix terminal line encryption 2009 2010
Page 31: Ghl systems net matrix terminal line encryption 2009 2010

Net MATRIX Terminal Line Encryption

Page 32: Ghl systems net matrix terminal line encryption 2009 2010
Page 33: Ghl systems net matrix terminal line encryption 2009 2010
Page 34: Ghl systems net matrix terminal line encryption 2009 2010
Page 35: Ghl systems net matrix terminal line encryption 2009 2010
Page 36: Ghl systems net matrix terminal line encryption 2009 2010

Acquiring Bank

EDC Terminals

Switching NAC

Remote NAC Remote NAC

Net MATRIX

Acquiring Host

160 Message

Credit Card Host NII: 160

“Typical” Transaction Flow

Issuing Bank Host

Page 37: Ghl systems net matrix terminal line encryption 2009 2010

EDC Terminals

Switching NAC

Remote NAC Remote NAC

161 Enc Message

Credit Card Host NII: 160

NetMATRIX TLE NII: 161

160 Enc Message

Encrypted Transaction Flow

Issuing Bank Host

Net MATRIXAcquiring

Bank

Acquiring Host

Page 38: Ghl systems net matrix terminal line encryption 2009 2010

Encrypted Transaction Flow II

Issuing Bank Host

EDC Terminals

Switching NAC

Remote NAC Remote NAC

161 Enc Message

Credit Card Host NII: 160

160 Enc Message

NetMATRIX TLE NII: 161

Net MATRIXAcquiring

Bank

Acquiring Host

Page 39: Ghl systems net matrix terminal line encryption 2009 2010
Page 40: Ghl systems net matrix terminal line encryption 2009 2010
Page 41: Ghl systems net matrix terminal line encryption 2009 2010
Page 42: Ghl systems net matrix terminal line encryption 2009 2010
Page 43: Ghl systems net matrix terminal line encryption 2009 2010
Page 44: Ghl systems net matrix terminal line encryption 2009 2010
Page 45: Ghl systems net matrix terminal line encryption 2009 2010
Page 46: Ghl systems net matrix terminal line encryption 2009 2010
Page 47: Ghl systems net matrix terminal line encryption 2009 2010
Page 48: Ghl systems net matrix terminal line encryption 2009 2010
Page 49: Ghl systems net matrix terminal line encryption 2009 2010
Page 50: Ghl systems net matrix terminal line encryption 2009 2010

Accolades & Accomplishments

Page 51: Ghl systems net matrix terminal line encryption 2009 2010
Page 52: Ghl systems net matrix terminal line encryption 2009 2010