Formal Analysis of the EMV Protocol Suite

نویسندگان

  • Joeri de Ruiter
  • Erik Poll
چکیده

This paper presents a formal model of the EMV (EuropayMasterCard-Visa) protocol suite in F# and its analysis using the protocol verification tool ProVerif [4] in combination with FS2PV [3]. The formalisation covers all the major options of the EMV protocol suite, including all card authentication mechanisms and both onand offline transactions. Some configuration parameters have to be fixed to allow any security analysis; here we follow the configuration of Dutch EMV banking cards, but the model could easily be adapted to other configurations. As far as we know this is the first comprehensive formal description of EMV. The convenience and expressivity of F# proved to be a crucial advantage to make the formalisation of something as complex as EMV feasible. Even though the EMV specs amount to over 700 pages, our formal model is only 370 lines of code. Formal analysis of our model with ProVerif is still possible, though this requires some care. Our formal analysis does not reveal any new weaknesses of the EMV protocol suite, but it does reveal all the known weaknesses, as a formal analysis of course should.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing EMV Tokenisation with Dynamic Transaction Tokens

Europay MasterCard Visa (EMV) Tokenisation specification details how the risk involved in Personal Account Number (PAN) compromise can be prevented by using tokenisation. In this paper, we identify two main potential problem areas that raise concerns about the security of tokenised EMV contactless mobile payments, especially when the same token also called a static token is used to pay for all ...

متن کامل

Security Enhanced EMV-Based Mobile Payment Protocol

Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transa...

متن کامل

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

The rapid progress in the internet requires multiple message communication over the wider area to improve the mobile network security. Due to the multiple message communication, the security is a most important concern in mobile network. The bilinear Certificate less Aggregate Signcryption Scheme guarantees the security under several attacks, and therefore provides security and non-repudiation....

متن کامل

Formal Analysis of CWA 14890-1

Formal analysis is of importance in order to increase confidence that the protocol satisfies its security requirements. In particular, the results obtained from the formal analysis of the smart card security protocols when smart cards are used as a specific type of Secure Signature Creation Devices (SSCDs) are presented. SSCDs are developed to support the EU-directive on electronic signatures. ...

متن کامل

Verification of A Security Adaptive Protocol Suite Using SPIN

communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior. Formal verification plays an important role in development and application of safety critical systems. Formalized exhausted verification te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011