Cardholder Verification Method (CVM) and DDA in EMV Cards
22 Questions
37 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

In the context of authenticated key establishment protocols, what is the purpose of using long-term keys or passwords?

  • Protecting subsequent communications using authenticated encryption
  • Establishing short-term session keys
  • Ensuring perfect forward secrecy
  • Verifying the identities of communicating parties (correct)
  • Which standard document specifies key-based authentication using message authentication codes?

  • ISO/IEC 9798-3
  • ISO/IEC 9798-1
  • ISO/IEC 9798-4 (correct)
  • ISO/IEC 9798-2
  • What type of attack can EMV cards be vulnerable to due to relay attacks launched via malicious Point of Sale (POS) terminals?

  • Replay attack
  • Denial-of-Service (DoS) attack
  • Side-channel attack
  • Man-in-the-Middle (MiTM) attack (correct)
  • Which protocol commonly implemented for Internet banking uses message authentication codes for authentication?

    <p>One-time password (OTP)</p> Signup and view all the answers

    What is the primary goal of a relay attack on EMV cards launched via malicious POS terminals?

    <p>To intercept and alter communication between cardholder and bank server</p> Signup and view all the answers

    Which aspect ensures the notion of a secure channel in authenticated key establishment protocols like TLS, SSH, IPsec, and VPN?

    <p>Message authentication codes</p> Signup and view all the answers

    What technique is recommended to slow down dictionary and brute-force attacks in password hashing?

    <p>Using key derivation functions</p> Signup and view all the answers

    What method can make pre-computed rainbow tables infeasible in recovering passwords?

    <p>Adding salt to passwords</p> Signup and view all the answers

    In which document has key-based authentication using secret-key encryption been standardized?

    <p>ISO/IEC 9798-2</p> Signup and view all the answers

    What is the main purpose of using symmetric-key encryption in authentication protocols?

    <p>To authenticate using keys stored in secure devices</p> Signup and view all the answers

    Which technique is intentionally designed to use large amounts of RAM to thwart password attacks with custom-built circuits like ASIC and GPU?

    <p>SCrypt Key Derivation Functions</p> Signup and view all the answers

    What problem does adding salt aim to solve in password hashing?

    <p>Dictionary attacks</p> Signup and view all the answers

    What does the base64 encoding do for hashed passwords in Cisco devices?

    <p>Identifies the hash type</p> Signup and view all the answers

    What is the main purpose of using digital signatures in authentication protocols?

    <p>To provide non-repudiation of the message sender</p> Signup and view all the answers

    What does the ICT2213 course cover related to authentication protocols?

    <p>Different key-based authentication standards using primitives like digital signatures and MACs</p> Signup and view all the answers

    What type of attack can be successful even against long passwords if stolen?

    <p>Dictionary Attacks</p> Signup and view all the answers

    What is the recommended approach for signing and encrypting a message, as described in the text?

    <p>Sign-then-Encrypt (StE)</p> Signup and view all the answers

    What is the purpose of including an addressee in the message when using the Sign-then-Encrypt (StE) approach?

    <p>To prevent a masquerading attack</p> Signup and view all the answers

    Which of the following is NOT a way of implementing authentication protocols, as mentioned in the text?

    <p>What you are (e.g. biometrics)</p> Signup and view all the answers

    In the context of authentication protocols, what is the purpose of a 'challenge-response' mechanism?

    <p>All of the above</p> Signup and view all the answers

    Which of the following cryptographic primitives is most likely used to ensure the integrity and authenticity of a message, as described in the text?

    <p>Digital Signatures</p> Signup and view all the answers

    What is the purpose of the PKCS#7 standard mentioned in the text?

    <p>It specifies the format for encrypted messages</p> Signup and view all the answers

    Study Notes

    Cardholder Verification Method (CVM)

    • Prevents use of lost/stolen card PIN (chip-and-PIN) and signature (chip-and-signature)
    • No CVM for low-value transactions only

    Public Key Generation and Distribution under DDA

    • Illustrates how public keys are generated and distributed under the Dynamic Data Authentication protocol

    DDA and PIN Verification

    • DDA and PIN verification

    Relay Attack on EMV Cards

    • EMV cards vulnerable to relay attacks launched via malicious POS terminals

    ISO/IEC 9798-4 Standard

    • Key-based authentication using message authentication codes standardized in ISO/IEC 9798-4 document

    One-time Password (OTP)

    • Example authentication protocol using MAC, commonly implemented for Internet banking
    • Vulnerable to Man-in-the-Middle (MiTM) attack if attacker is able to place himself between customer and bank’s server, e.g., via phishing attack

    Authenticated Key Establishment (AKE) Protocols

    • After successful authentication, secure communications often require AKE protocols
    • AKE protocol consists of:
      • Authentication: Using long-term keys or passwords to verify identities of communicating parties
      • Key establishment: Establishing short-term session keys for connection session
    • Session key protects subsequent communications using authenticated encryption, achieving notion of secure channel, e.g., TLS, SSH, IPsec, VPN

    Key Establishment Protocols

    • Categorized into key transport or key agreement protocols

    Decentralized vs. Centralized

    • Administrator can be malicious

    Storing Hashed Passwords

    • Stored using cryptographically secure hash function h()
    • Vulnerable to attacks, e.g., rainbow tables

    Using Salt

    • Adding random bits (salt) to password makes pre-computed rainbow tables infeasible

    Dictionary Attack

    • Even salted hashed passwords can be vulnerable to dictionary attacks with increasing computing power
    • Skillful attackers can recover even long passwords

    NIST’s New Password Guidelines

    • Issued in 2017, regarding digital identity guidelines

    Alternative Approach by Bruce Schneier

    • Recommends scheme to create strong password

    Key Derivation Functions

    • Used to further slow down dictionary and brute-force attacks
    • Generate password hashes, controlling amount of time to verify a single password guess
    • Example: SCrypt KDF, designed to use large amounts of RAM to thwart password attacks using custom-built parallel circuits like ASIC and GPU

    Example Password Hashes in Cisco Devices

    • Options for storing hashed passwords in Cisco devices
    • Hashed password is base64-encoded, with type of algorithm identified by number at the beginning of the string

    Cisco’s Base64 Encoding

    • Different base64 table used

    Key-Based Authentication

    • Implemented using keys stored in secure devices, a “what you have” type of authentication
    • Implementation options: symmetric-key encryption, digital signatures, MACs

    Earliest Key-Based Authentication Protocol

    • Implemented in IFF system, a simple challenge-response protocol using a secret key
    • Mutual authentication with IFF: to prevent friendly fighters from shooting down each other
    • Vulnerable to reflection attacks

    ISO/IEC 9798-2 Standard

    • Key-based authentication using secret-key encryption standardized in ISO/IEC 9798-2 document

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on Cardholder Verification Methods (CVM) like chip-and-PIN, chip-and-signature, and no CVM. Learn about Public key generation and distribution in Dynamic Data Authentication (DDA) protocol, as well as DDA and PIN verification techniques. Explore the vulnerability of EMV cards to relay attacks.

    More Like This

    Use Quizgecko on...
    Browser
    Browser