17
END TO END ENCRYPTION Heartland’s Silver Lining?

End-to-End Encryption for Credit Card Processing

Embed Size (px)

DESCRIPTION

Discussion of different approaches to E2EE in the credit card industry.

Citation preview

Page 1: End-to-End Encryption for Credit Card Processing

END TO END ENCRYPTION

Heartland’s Silver Lining?

Page 2: End-to-End Encryption for Credit Card Processing

Overview

Heartland breach as impetus for End-to-End Encryption

Description of card transaction process Heartland’s approach to End-to-End

Encryption Encryption and Key Management

Methods used Other Processor & Merchant solutions Smartcard solutions

Page 3: End-to-End Encryption for Credit Card Processing

Heartland Payment Systems, Inc On Inauguration Day, HPS announced breach

Occurred from May 2008 until January 2009 Approximately100 million credit and debit

cards compromised from 650 financial institutions

More electronic records were breached in 2008 than in the previous 4 years

Track (magnetic strip) Data was obtained which includes card number and sometimes Name.

Page 4: End-to-End Encryption for Credit Card Processing

The Beginning of End-to-End Robert Carr, CEO, has hosted a ‘preliminary

planning meeting’ on May 7th for the Accredited Standards Committee X9 at Heartland headquarters. As of 9/1/09, X9 did not have a standard yet.

The Goal – find a way to standardize End-to-End Encryption. This is being promoted as a panacea to external data threats.

Enabling E2EE would, in theory, limit the scope of PCI-DSS security requirements and audits for merchants and Processors.

Page 5: End-to-End Encryption for Credit Card Processing

The Credit Debit Process

Page 6: End-to-End Encryption for Credit Card Processing

The Credit Debit Process

Page 7: End-to-End Encryption for Credit Card Processing

The Credit Debit Process

Loyalty Programs

Page 8: End-to-End Encryption for Credit Card Processing

The Credit Debit Process

Loyalty Programs

Page 9: End-to-End Encryption for Credit Card Processing

The Heartland-Voltage Security Plan E3

•Tamper Resistant Terminal encrypts PAN with AES•Equipment manages its own private keys•Encrypted data is passed to and from Processor•Unencrypted track data is not stored at Merchant•Merchant stores all encrypted card data in a HSM.

•Encryption keys are stored with Processor•All encryption/decryption happens at Processor’s HSM•“Securely Delivered” to the card brands•Token is Card Brand reference#, date stamp & last 4 digits of the PAN•Token is sent back to merchant for chargebacks and other post-processing

1234-56XX-XXXX-7899

Page 10: End-to-End Encryption for Credit Card Processing

FFSEM Mode AES and IBE

FFSEM – Feistel Finite Set Encryption Mode Preserves the format of the data while

encrypting the digits for system management purposes w/AES.

Encrypts numbers only and data must be between 9 and 19 digits.

Developed by Voltage, Heartland’s encryption partner, and not yet PCI authorized method.

IBE – Identity Based Encryption uses shared information about cardholder as the public key. Public and private keys are managed by a trusted third party called the PKG (private key generator).

Page 11: End-to-End Encryption for Credit Card Processing

Hardware Security Module

Secure cryptoprocessor Goals:

Onboard secure key generation Onboard secure storage Use of cryptographic and sensitive data

material Offloading application servers for complete

asymmetric and symmetric cryptography. Provides both logical and physical

protection from non-authorized use.

Page 12: End-to-End Encryption for Credit Card Processing

Steven Elefant, CIO HPS

“When we peel back the onion and look at the so-called end-to-end solutions out there, we find that they're really point-to-point solutions…True end-to-end encryption to us, … [starts] from the time the digits leave the magstripe on the consumer's card, and is turned from analog data into digital data, [and continues] all the way through the terminal, through the wires, through our host processing network until we securely deliver it to the brands.”

Page 13: End-to-End Encryption for Credit Card Processing

Other Hats in the Arena

First Data and RSA have teamed up for a tokenization approach where the encrypted card data is at the Processor site and the merchant has only the token, created by the Processor.

RBS Worldpay (another hacker victim) will market VeriFone secure swipe terminals. Also uses format-preserving AES encryption.

Merchants are pursuing their own tokenization schemes. Fingerhut will tokenize all of their card data-at-rest and store encrypted card numbers in an HSM.

Page 14: End-to-End Encryption for Credit Card Processing

E2EE - Problems

Not all transactions are initiated at a swipe machine. How often have you made a payment over the phone or on the internet?

Virtual Point of Sale websites are replacing swipe machines, increasing web exposure to card data.

Many business need to un-encrypt card data for recurring transactions, returns, pay on ship, etcetra.

The one greatest point of weakness, the magnetic strip can still be lifted and cloned.

Most End-to-End solutions do not extend past the processor.

Page 15: End-to-End Encryption for Credit Card Processing

E2EE – How It Would Work

Visa’s recommendations: Limit clear-text cardholder and authentication data Use robust key management solutions that meet

international standards Use recognized cryptographic algorithms Protect devices used to perform cryptographic

functions Consider Tokenization as a data surrogate in place

of credit card numbers. They are essentially recommending the use of

the smartcard(chip) or something like a Speedpass

Page 16: End-to-End Encryption for Credit Card Processing

Other Security Measures - Smartcards EMV – Microprocessor Chip Card popular

outside the US. Expensive to implement: Cryptographic coprocessor Public key certificate management at the

terminal level Card data is still being stolen and

transferred to the US for fraudulent transactions with mag-strip cloned cards.

Contactless Token – (i.e. speedpass)

Page 17: End-to-End Encryption for Credit Card Processing

Other Security Measures - Smartcards Contactless Smartcards with Online

Dynamic Cryptograms Cryptogram is a type of digital signature