Bristol researchers work to secure next generation chip-card payment technology

Nov 05, 2013

Current chip technology used for purchasing items via credit and debit cards in shops was developed in the mid-1990s. EMVCo, the standard body which manages, maintains and advances EMV Specifications, is in the process of designing the next generation payment technology to meet long-term industry requirements. The activity will establish a common, robust technology platform for supporting contact and contactless/mobile interfaces for both online and offline transactions.

Dr Gaven Watson from Bristol's Department of Computer Science will be presenting a paper at the prestigious Association of Computing Machinery's Conference on Computer and Communications Security (ACM-CCS) sharing the details of a study that validates the proposed design to be used in future EMV chip cards.

This protocol was developed by EMVCo and then published on its website as a request for comments (RFC). University of Bristol researchers responded and proved mathematically that the protocol meets the security goals that it was designed to achieve.

The protocol sits at the heart of the new specification as it offers a key agreement system based on elliptic curve cryptography. Due to the constrained nature of payment cards, and some new requirements for protecting contactless transactions, the new protocol needed to be created.

Nigel Smart,Professor of Cryptology at the University of Bristol, said: "This is an important step in validating the we will all start to use in the future. When the previous was designed people did not know how to mathematically prove that a protocol satisfied certain security goals. The science of cryptography has advanced and is now at a stage where this is possible and protocols that will be used in the real world can be fully analysed."

Christina Hulka, Chair of the EMVCo Board of Managers, added: "EMVCo welcomes the initiative of Professor Nigel Smart and his fellow researchers in developing a security proof of this key agreement protocol. EMVCo is of the view that the new cryptographic algorithms and protocols that will be used to secure billions of EMV payment transactions should not only offer optimum performance but also receive the best analysis that modern cryptology can provide."

The paper represents joint work by the Bristol's Department of Computer Science and the Engineering Faculty of Tel-Aviv University.

Explore further: Contactless payment cards: Research highlights security concerns

More information: An analysis of the EMV Channel Establishment Protocol by Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson. eprint.iacr.org/2013/031
ACM Conference on Computer and Communications Security [ACM-CCS] 2013.

add to favorites email to friend print save as pdf

Related Stories

Cambridge team exposes EMV card vulnerabilities

Sep 13, 2012

(Phys.org)—At a cryptography gathering in Leuven, Belgium, on Tuesday, Cambridge University researchers made it known that they do not like what they see in chip and pin systems. Banks rely on customer ...

Security card with a one-time password and LED display

Mar 06, 2013

Infineon Technologies AG and Bundesdruckerei GmbH have developed a new security smart card with an LED display and a one-time password. This new technology is centred around a security chip in the card which ...

Using your car key as a credit card?

Oct 22, 2008

(PhysOrg.com) -- BMW Group Research and Technology and NXP Semiconductors, the independent semiconductor company founded by Philips, have unveiled a prototype of the world’s first multifunctional car key. The prototype ...

Recommended for you

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Teaching computers the nuances of human conversation

Sep 12, 2014

Computer scientists have successfully developed programs to recognize spoken language, as in automated phone systems that respond to voice prompts and voice-activated assistants like Apple's Siri.

Mapping the connections between diverse sets of data

Sep 12, 2014

What is a map? Most often, it's a visual tool used to demonstrate the relationship between multiple places in geographic space. They're useful because you can look at one and very quickly pick up on the general ...

User comments : 0