Advertisement

Integrity Mechanisms in German and International Payment Systems

  • Detlef Kraus
Chapter
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 124)

Abstract

An overview of measures used to ensure data integrity in German and international payment systems will be given. While symmetrical cryptographic algorithms are mainly used in national electronic cash system or in electronic purse, asymmetrical procedures are in use in international systems in order to simplify the key management. The descriptions of the payment systems are kept short and focus merely on some measures to ensure integrity and process control. They are not suitable to give a complete description of the overall system security. It is assumed that the reader knows, how an asymmetrical cryptographic algorithm works and is acquainted with the various operation modes of a symmetrical asymmetrical cryptographic (here Triple-DES).

Key words

authentication cryptography encryption electronic purse electronic cash EMV hash value integrity mechanisms key management message authentication code PIN RSA Secure Messaging security evaluation criteria smart card security module 

References

  1. [EMV B1]
    Europay International, MasterCard International and Visa International, Integrated Circuit Card Specification for Payment Systems, Book 1, Application Independent ICC to Terminal Interface Requirements, Version 4. 0, December 2000Google Scholar
  2. [EMV B2]
    Europay International, MasterCard International and Visa International, Integrated Circuit Card Specification for Payment Systems, Book 2, Security and Key Management, Version 4. 0, December 2000Google Scholar
  3. [EMV B3]
    Europay International, MasterCard International and Visa International, Integrated Circuit Card Specification for Payment Systems, Book 3, Application Specification, Version 4. 0, December 2000Google Scholar
  4. [EMV B4]
    Europay International, MasterCard International and Visa International, Integrated Circuit Card Specification for Payment Systems, Book 4, Cardholder, Attendant, and Acquirer Interface Requirements, Version 4. 0, December 2000Google Scholar
  5. [ISO 10118]
    ISO 10118-2, Information technology - Security techniques - Hash-functions, Part 2: Hash-functions using an n-bit block cipher algorithm, 1994Google Scholar
  6. [ISO 7816-4]
    ISO 7816-4, Identification cards - Integrated circuit(s) cards with contacts, Part 4: Inter-industry commands for interchange, 1995Google Scholar
  7. [ISO 7816-4A]
    cards with contacts, Part 4: Inter-industry commands for interchange, AMENDMENT 1: Impact of secure messaging on the structures of APDU messages, 1996Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Detlef Kraus
    • 1
  1. 1.SRC Security Research & Consulting GmbHBonnGermany

Personalised recommendations