Formal Analysis of the EMV Protocol Suite
- 1k Downloads
This paper presents a formal model of the EMV (Europay-MasterCard-Visa) protocol suite in F# and its analysis using the protocol verification tool ProVerif  in combination with FS2PV .
The formalisation covers all the major options of the EMV protocol suite, including all card authentication mechanisms and both on- and offline transactions. Some configuration parameters have to be fixed to allow any security analysis; here we follow the configuration of Dutch EMV banking cards, but the model could easily be adapted to other configurations.
As far as we know this is the first comprehensive formal description of EMV. The convenience and expressivity of F# proved to be a crucial advantage to make the formalisation of something as complex as EMV feasible. Even though the EMV specs amount to over 700 pages, our formal model is only 370 lines of code.
Formal analysis of our model with ProVerif is still possible, though this requires some care. Our formal analysis does not reveal any new weaknesses of the EMV protocol suite, but it does reveal all the known weaknesses, as a formal analysis of course should.
KeywordsSecurity Requirement Security Protocol Data Authentication Online Transaction Transaction Type
- 1.Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S., Anderson, R., Rivest, R.: Phish and chips: Traditional and new recipes for attacking EMV. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 5087, pp. 40–48. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 2.Barisani, A., Bianco, D., Laurie, A., Franken, Z.: Chip & PIN is definitely broken. Presentation at CanSecWest Applied Security Conference, Vancouver (2011), slides http://dev.inversepath.com/download/emv/emv_2011.pdf
- 5.Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Computer Security Foundations Workshop (CSFW), pp. 82–96. IEEE, Los Alamitos (2001)Google Scholar
- 8.EMVCo. EMV– Integrated Circuit Card Specifications for Payment Systems, Book 1: Application Independent ICC to Terminal Interface Requirements (2008)Google Scholar
- 9.EMVCo. EMV– Integrated Circuit Card Specifications for Payment Systems, Book 2: Security and Key Management (2008)Google Scholar
- 10.EMVCo. EMV– Integrated Circuit Card Specifications for Payment Systems, Book 3: Application Specification (2008)Google Scholar
- 11.EMVCo. EMV– Integrated Circuit Card Specifications for Payment Systems, Book 4: Cardholder, Attendant, and Acquirer Interface Requirements (2008)Google Scholar
- 12.Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: Symposium on Security and Privacy, pp. 433–446. IEEE, Los Alamitos (2010)Google Scholar
- 13.Van Herreweghen, E., Wille, U.: Risks and potentials of using EMV for internet payments. In: Proceedings of the 1st USENIX Workshop on Smartcard Technology, USENIX Association (1999)Google Scholar