We present an attack on hardware security modules used by retail banks for the secure storage and verification of customer PINs in ATM (cash machine) infrastructures. By using adaptive decimalisation tables and guesses, the maximum amount of information is learnt about the true PIN upon each guess. It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000 guesses intended. In a single 30 minute lunch-break, an attacker can thus discover approximately 7000 PINs rather than 24 with the brute force method. With a $300 withdrawal limit per card, the potential bounty is raised from $7200 to $2.1 million and a single motivated attacker could withdraw $30{50 thousand of this each day. This attack thus presents a serious threat to bank security.
http://cryptome.org/pacc.htm
Thursday, February 20, 2003
Popular Posts
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
Increasingly, the overstretched and overburdened have a new answer to work lives of gunning harder for what seems like less and less: Dont j...
-
http://www.homestarrunner.com/sbemail94.html
-
U.S. President George Bush is a big winner in this year's World Stupidity Awards, joining the likes of the entire petroleum industry and...
-
Very good bottle as a gift from Jason. Clean, woody, and elegant. http://www.theglenrothes.com/uk/