Vous êtes sur la page 1sur 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/323073718

An Overview of the EMV Protocol and Its Security Vulnerabilities

Conference Paper · February 2018


DOI: 10.1109/MOBISECSERV.2018.8311444

CITATIONS READS
2 1,065

3 authors:

Nour El Madhoun Emmanuel Bertin


Sorbonne Université Orange Labs
8 PUBLICATIONS   48 CITATIONS    103 PUBLICATIONS   509 CITATIONS   

SEE PROFILE SEE PROFILE

Guy Pujolle
Sorbonne Université
789 PUBLICATIONS   6,517 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

SUNI: Secure and Unified Network Infrastructure View project

IOT security View project

All content following this page was uploaded by Nour El Madhoun on 19 March 2018.

The user has requested enhancement of the downloaded file.


An Overview of the EMV Protocol and Its Security
Vulnerabilities
Nour El Madhoun∗ , Emmanuel Bertin† , Guy Pujolle∗
∗ Sorbonne Université, CNRS, LIP6, 4 place Jussieu 75005 Paris, France
† OrangeLabs, 42 rue des Coutures BP 6243 14066 Caen, France
Email: {nour.el-madhoun, guy.pujolle}@lip6.fr; emmanuel.bertin@orange.com

Abstract—EMV (Europay Mastercard Visa) is the inter- – With contact: the client inserts his bank card into
national standard implemented to secure purchase and de- the POS and enters a PIN code or a signature to
posit/withdrawal transactions. It represents a set of security authenticate himself. This case of payment is generally
rules and messages exchanged between the transaction actors
in order to guarantee important security properties (such as used for any amount requested by the merchant.
authentication, authorization, integrity, etc.). However, several – Contactless: this case of payment is based on the
recent research studies have analyzed the EMV security standard NFC (Near Field Communication) wireless technology
and show that it is vulnerable to attacks. This paper presents an which allows interaction between two devices without
overview of the EMV protocol and its security vulnerabilities. any physical contact, within a short distance (5-10
Index Terms—EMV protocol, EMV vulnerabilities, in-store
payment, NFC technology, security.
centimeters) [8]. This technology is integrated today
in the form of an NFC antenna in bank cards and
POS devices in order to rapidly perform contactless
I. I NTRODUCTION purchase transactions; the client only approaches the
NFC bank card near to the POS and he does not need
With the increase in the prices of our purchases, cash pay- to enter a PIN code or a signature. In fact, the NFC
ment becomes more difficult and less secure because we have payment is generally used for small amounts (less than
to carry large quantities of coins and banknotes. Therefore, 20 Euros in France). We note that NFC technology is
in order to safely manage our funds, guarantee the fluidity also integrated in smartphones that can then act as NFC
of our financial transactions and effectively get rid of using cards to execute contactless purchases [6]. In the rest
only cash, banks today offer us the possibility to open a bank of this paper, a client’s payment device either refers to
account and provide us with several means of payment such as a classic bank card or to an NFC bank card or to an
bank cards, checks and transfers [1]. Indeed, a bank payment NFC smartphone (see section II-A).
method can be used at any time and anywhere, and in the case
In this work, we are interested in introducing generali-
of theft or fraud, one only needs to call the bank and interrupt
ties on the EMV standard that is intended to secure pur-
the payment method. In the studies [2] [3] [4], authors show
chase (contact/contactless-NFC) and deposit/withdrawal trans-
that the bank card is considered the safest and most practical
actions. Authors of many recent studies have analyzed this
means of payment because it: is simple to obtain by banks, is
standard by showing that it is vulnerable to attacks and it fails
small in size (we can safely keep it to be protected), includes
to ensure important security properties. We also present an
insurance/assistance and it allows to [5] [6] [7]:
overview of these vulnerabilities in this paper.
• Deposit or withdraw cash: by inserting it into any ATM
(Automated Teller Machine) and by entering a PIN II. EMV S TANDARD
(Personal Identification Number) code to authenticate the EMV is the security payment standard managed by a con-
client (cardholder). sortium EMV with shared control between payment schemes:
• Perform online payments: by manually entering the bank- Visa [9], MasterCard [10], American Express [11], JCB (Japan
ing data, which are stored in the card, on the website of Credit Bureau) [12], China UnionPay [13] and Discover [14].
the merchant. The online payment is done remotely where It allows to secure the communication between the actors
the client and the merchant are not in the same place. involved in a contact/contactless-NFC purchase transaction
The banking data are: PAN (Primary Account Number), and in a deposit/withdrawal operation, by exchanging a set
client’s name, expiration date, security code (three-digit of security messages and rules [15]. For more details and
visual cryptogram). clarifications about the EMV protocol, it is essential to consult
• Make purchases in stores where the client and the mer- these references [6] [15] [16] [17] [18] [19].
chant are in the same place, and the merchant’s payment
device is represented by a POS (Point Of Sale) machine. A. EMV Actors
The purchase transaction in a store can be executed in Fig-1 illustrates the actors that participate in executing a
two different cases: secure purchase or deposit/withdrawal transaction [1] [16]:

1
(1)

(2) (4)

(4)

(5)

(3) (5)

Fig. 1. EMV payment system

(1) Payment scheme (Visa, MasterCard, American Express, purchases. The banking data are either stored in the SIM
etc.): it is a network guaranteeing the transfer of money and card as in orange bank system [21] or are replaced by
the communication between banks. Any eligible establishment tokenized banking data [22] [23].
can enter this scheme as a member to become a bank with (4) Acquiring bank: it is the bank that contracts with the
licensing fees. For settlement of a purchase transaction, the merchant to open a company’s bank account.
acquiring bank communicates with the issuing bank (and vice (4)’ ATM bank: it is the bank that provides ATM machines.
versa for a refund) through the payment scheme thanks to (5) POS: it is the merchant’s device provided by the
the banking network. The same principle is used so that the acquiring bank and allowing to accept contact/contactless-NFC
ATM bank communicates with the issuing bank to complete purchases from client payment devices.
a deposit/withdrawal transaction. (5)’ ATM: it allows for a client to use his bank card to
(2) Issuing bank: it is the bank that contracts with the client deposit or withdraw cash money.
to open his bank account. It generates banking data identifying
B. EMV Protocol Session
the client and ensuring security purposes (as authentication,
authorization, etc.). These banking data are sensitive and they To perform a secure EMV purchase or deposit/withdrawal
are securely stored in the issuing bank. transaction, EMV actors exchange security messages that can
be divided into four steps [15] [16] [18]:
(3) Client’s payment device:
1) Initialization: it is a primary negotiation step between
• Bank card: it is provided by the issuing bank and includes the client’s payment device and the POS/ATM. The latter gets,
a smart chip which is able to execute cryptographic from the client’s payment device, basic data needed for the
security functions. It may contain only one contact in- next steps such as the PAN and the expiration date, and other
terface or both contact and NFC interfaces. It can be information about the security features and configurations
used to make contact/contactless-NFC purchases or to supported by the client’s payment device. The latter may
deposit/withdraw cash money (see section I). In addition, optionally request from the POS/ATM some information (as
the issuing bank securely stores the banking data in its the country code, the amount...) before sending its own data.
smart chip. 2) Authentication of the client’s payment device: this step
• NFC smartphone: it integrates an NFC antenna and it acts provides protection against counterfeit client payment devices
as an NFC bank card in card emulation mode thanks to an and ensures the integrity of banking data. There are three EMV
NFC payment application provided by the issuing bank authentication methods: SDA (Static Data Authentication),
[5] [20]. It can only be used to make contactless-NFC DDA (Dynamic Data Authentication) and CDA (Combined

2
Data Authentication). In fact, this step is optional and the approval. If the client’s payment device receives the
client’s payment device tells the POS/ATM, in the previous approval, then it sends a TC to the POS/ATM as a
step, which methods it supports. If the POS/ATM and the confirmation proof of the transaction.
client’s payment device support one or more common meth- • Declined transaction: in both modes, the client’s payment
ods, then the POS/ATM shall execute the most secure (highest) device can completely reject the transaction where it
common method supported by both. However, if there are no sends to the POS/ATM an AAC (Application Authen-
common method, then this step will not be executed. tication Cryptogram) instead of a TC or an ARQC.
3) Authentication of the client: this step allows protection
against lost and stolen client payment devices. The client’s III. EMV A NALYZES
payment device must support at least one CVM (Cardholder
Verification Method). One can encounter the following types A. EMV Security Vulnerabilities
of CVMs:
1) Vulnerabilities attached to the EMV specification
• PIN entry: the client enters the PIN code into the PIN pad
on the POS/ATM. This PIN can be validated and verified a) In the study [17], authors demonstrate that an attacker
in two different ways: can authorize an EMV purchase transaction by entering
an incorrect PIN code in the offline case of the EMV
– Online: the POS/ATM sends it encrypted using a
step 3. The attacker modifies the step 3 by sending
symmetric key to the issuing bank, which can check
the POS a message indicating that the PIN entered (by
whether it is correct or not.
the attacker) is well verified by the client’s payment
– Offline: the POS/ATM sends it encrypted using the
device and it is correct, and by informing the client’s
asymmetric cryptography or in clear to the client’s pay-
payment device that the transaction is verified by a
ment device, which compares it with the PIN reference
signature and no PIN is required. The main cause for
stored in its memory.
this attack is that: the response of the client’s payment
• Handwritten signature: the client provides his signature device indicating that the PIN code was correct is not
on a paper (receipt). authenticated by the POS [24].
• PIN and signature: this method is simply a combination b) If the client’s payment device is a bank card that
of a PIN entered and a written signature that are both supports SDA method, then it can be easily cloned
provided by the client. and the cloned card can be used to perform offline
• No CVM: it is intended only for contactless-NFC pur- purchase transactions. Consequently, the cloned card
chases that do not require to entrer a PIN code or a can also be programmed to support the CVM ’offline
signature, because they must be executed quickly and they plaintext PIN’ and to confirm any PIN received for
are limited to small amounts as presented in section I. verification. In fact, this vulnerability is only detected
In fact, the choice of executing a CVM is governed by by the issuing bank and not by the POS [18].
the capabilities of the client’s payment device, POS/ATM c) The EMV payment system guarantees that client pay-
capabilities and the type of the transaction performed. The ment devices corresponding to different issuing banks
client’s payment device sends a CVM list containing its are accepted by any POS/ATM of any acquiring/ATM
capabilities to the POS/ATM in the initialization step. The bank around the world. Therefore, to make any client’s
CVM list also indicates the priority order of CVMs so that payment device compatible with any POS/ATM, the
the POS/ATM will execute each CVM according to its priority, EMV primary negotiation step is included (see section
and if one CVM fails, the POS/ATM continues with the next II-B). The papers [25] and [26] show that this step
CVM until at least one is successful or the list is finished. presents an important vulnerability in the EMV stan-
4) The actual transaction: it is the final step in EMV dard, where it is possible for an attacker to modify
protocol and it is not optional as step 2 if there is no common the abilities of the client’s payment device or the
method or step 3 in the case of NFC payment. Indeed, it can POS/ATM to put the POS/ATM in a vulnerable state.
be executed either in the online mode (with the issuing bank) This type of attack is called a downgrade attack.
or in the offline mode (with the client’s payment device). The • According to EMV specifications [15], an EMV
POS/ATM chooses what mode it wants to perform the actual contactless-NFC purchase transaction should not
transaction, but the client’s payment device may refuse the be accepted if an attacker uses a cloned NFC
choice of an offline mode and force the POS/ATM to go online. bank card, because the original secret key of the
• Offline transaction: the client’s payment device provides original NFC bank card cannot be copied. How-
a confirmation proof of the transaction through a TC ever, in the work [25], authors demonstrate that
(Transaction Certificate) to the POS/ATM, which sends an attacker who happens to clone an NFC bank
it later to the issuing bank. card (without copying the original secret key), can
• Online transaction: the client’s payment device provides modify the capabilities of the cloned NFC bank
an ARQC (Authorisation Request Cryptogram) to the card to fool the POS into executing a contactless-
POS/ATM which forwards it to the issuing bank for NFC magnetic stripe purchase transaction (used in

3
the United States) rather than an EMV contactless- reading distance, thanks to an amplifier which can be
NFC purchase transaction [24]. attached to the NFC antenna of an unauthenticated
d) Authors in [27] illustrate that it is theoretically possible NFC reader to reach up until 1.50 meters. In fact,
to falsify a DDA or CDA cryptographic authentica- the attacker can use the banking data to make online
tion signature. This attack is not practical because it fraudulent purchases, to track the client using the PAN
is necessary to execute 4,639 partial transactions by number and also to do a brute force attack to obtain
accessing the client’s payment device to generate the the security code as presented in [7].
falsified DDA or CDA signature. Also, each transaction B. Proposed Solutions
lasts about 500ms and therefore, in order to achieve this
attack, one needs to have access to the client’s payment Security protocols have been proposed in [6] [35] [36] [37]
device for 38 minutes [24]. to guarantee the confidentiality of banking data and ensure the
e) The studies [1] [6] [28] show that the EMV standard authentication of the POS/ATM to the client’s payment device.
does not ensure the full required security for a pur- In the study [7], authors present a solution preventing attacks
chase or deposit/withdrawal transaction by missing the by brute force.
guarantee of two security properties:
• The confidentiality of banking data: the client’s
payment device sends banking data "the PAN and
the expiration date" in clear to the POS/ATM in the
initialization step.
• The authentication of the POS/ATM is not ensured
to the client’s payment device. The latter can
communicate with any unauthenticated reader by
sending the banking data without encryption.
f) After a successful EMV purchase transaction, the POS
prints two proofs of payment: the first one is intended
for the client and contains the PAN and the expiration
date truncated both, the second one is destined to the
trader and contains the PAN and the expiration date
written both in clear text for traceability purposes.
In [1] [29], authors indicate that a thief can steal
Fig. 2. Contactless relay attack [24] [33]
the merchant printed proofs to get banking data from
several clients. Then, he can use the stolen data to IV. C ONCLUSION
make fraudulent purchase transactions on the internet In this paper, we presented an overview of the EMV
without needing to enter the security code: several payment standard and we discussed its security vulnerabilities.
websites as "www.amazon.com", "www.zappos.com"
R EFERENCES
do not request the security code.
[1] N. El Madhoun and E. Bertin, “Magic always comes with a price:
2) Vulnerabilities due to the contactless-NFC interface Utility versus security for bank cards,” The 1st IEEE Cyber Security
a) By default, NFC technology allows communication in Networking Conference (CSNet’17), 2017.
between two devices within a short distance "5-10cm". [2] Etude de l’institut de sondages d’opinion CSA, “Les français et les
moyens de paiement,” last connection (06/08/2017). [Online]. Available:
Therefore, the EMV consortium has assumed that a https://www.economie.gouv.fr/files/sondagecsa_synthese.pdf
contacless-NFC purchase transaction cannot exceed [3] Féderation bancaire française, “Les moyens de paiement,” last
this short distance [30]. Hence, a relay attack presented connection (06/08/2017). [Online]. Available: http://www.fbf.fr/fr/files/
AC3CBC/Les%20Moyens%20de%20Paiement.pdf
in [31] [32] breaks this assumption by showing that it is [4] La finance pour tous, “La carte bancaire,” last connection
possible to perform an NFC purchase transaction using (06/08/2017). [Online]. Available: http://www.lafinancepourtous.com/
an NFC bank card which is at a distance of several Banque-au-quotidien/Moyens-de-paiement/La-carte-bancaire/
[5] H. A. Al-Ofeishat and A. Mohammad, “Near field communication (nfc),”
kilometers from the POS. Fig-2 illustrates this attack International Journal of Computer Science and Network Security, pp.
[24] [33]. 93–99, 2012.
b) A contactless-NFC purchase transaction is done wire- [6] N. El Madhoun and G. Pujolle, “Security enhancements in emv protocol
for nfc mobile payment,” The 15th IEEE International Conference on
lessly and this leaves a vulnerability for data hacking Trust, Security and Privacy in Computing and Communications (IEEE
attacks: eavesdropping and prolonging reading dis- TrustCom-16), 2016.
[7] M. A. Ali, B. Arief, M. Emms, and A. van Moorsel, “Does the online
tance. The papers [28] [34] show that an attacker can card payment landscape unwittingly facilitate fraud?” IEEE Security &
eavesdrop the NFC communication during an NFC Privacy, vol. 15, no. 2, pp. 78–86, 2017.
purchase transaction to retrieve the banking data sent [8] S. A. Ahson and M. Ilyas, Near field communications handbook. CRC
without encryption. Also, he can remotely steal bank- Press, 2011.
[9] VISA, last connection (20/10/2017). [Online]. Available: https:
ing data from NFC bank cards, by extending the NFC //www.visa.fr/

4
[10] MasterCard, last connection (20/10/2017). [Online]. Available: http: [37] ——, “A cloud-based secure authentication protocol for contactless-
//www.mastercard.com/fr/particuliers/index.html nfc payment,” IEEE 4th International Conference on Cloud Networking
[11] American Express, last connection (20/10/2017). [Online]. Available: (CloudNet), pp. 328–330, 2015.
https://www.americanexpress.com/fr/
[12] Japan Credit Bureau, last connection (20/10/2017). [Online]. Available:
http://www.global.jcb/en/
[13] China UnionPay, last connection (20/10/2017). [Online]. Available:
http://www.unionpayintl.com/en/
[14] Discover Card, last connection (20/10/2017). [Online]. Available:
https://www.discover.com/
[15] EMV Books - Integrated Circuit Card Specifications for Payment
Systems, Book 1: Application Independent ICC to Terminal Interface
Requirements, Book 2: Security and Key Management, Book 3: Applica-
tion Specification, Book 4: Cardholder Attendant and Acquirer Interface
Requirements, V. 4.3, EMVCo, http://www.emvco.com/, Nov. 2011.
[16] J. De Ruiter and E. Poll, “Formal analysis of the emv protocol suite,”
Springer Theory of Security and Applications, pp. 113–129, 2012.
[17] S. J. Murdoch, S. Drimer, R. Anderson, and M. Bond, “Chip and pin is
broken,” IEEE Symposium on Security and Privacy, pp. 433–446, 2010.
[18] J. van den Breekel, D. A. Ortiz-Yepes, E. Poll, and J. de Ruiter, “Emv
in a nutshell,” Technical Report, 2016.
[19] S. Bouzefrane, “La norme emv,” last connection (06/08/2017).
[Online]. Available: http://cedric.cnam.fr/~bouzefra/cours/Cartes_
Bouzefrane_EMV_nov2009.pdf
[20] V. Coskun, B. Ozdenizci, and K. Ok, “A survey on near field commu-
nication (nfc) technology,” Springer Wireless personal communications,
pp. 2259–2294, 2013.
[21] Orange Bank, “Le paiement mobile.” [Online]. Available: https:
//www.orangebank.fr/portalserver/informations-utiles/paiement-mobile
[22] U. Mattsson and Y. Rozenberg, “Tokenization in payment environ-
ments,” 2013, uS Patent App. 13/761,009.
[23] M. R. Ornce, R. Moyer, G. J. Sackenheim, A. B. Dollarhide, K. R.
Glenn, and S. H. Pile, “Tokenized contactless payments for mobile
devices,” 2011, uS Patent App. 13/315,544.
[24] M. J. Emms, “Contactless payments: usability at the cost of security?”
Newcastle University, 2016.
[25] M. Roland and J. Langer, “Cloning credit cards: A combined pre-
play and downgrade attack on emv contactless,” WOOT - 7th USENIX
conference on Offensive Technologies, 2013.
[26] A. Barisani, D. Bianco, A. Laurie, and Z. Franken, “Chip and pin
is definitely broken,” Presentation at CanSecWest Applied Security
Conference, Vancouver, 2011.
[27] J. P. Degabriele, A. Lehmann, K. G. Paterson, N. P. Smart, and
M. Strefler, “On the joint security of encryption and signature in emv,”
pp. 116–135, 2012.
[28] M. Emms and A. van Moorsel, “Practical attack on contactless payment
cards,” HCI2011 Workshop Heath, Wealth and Identity Theft, 2011.
[29] Les experts Ooreka, “Ticket de carte bancaire,” last connection
(06/08/2017). [Online]. Available: https://carte-bancaire.ooreka.fr/
astuce/voir/515831/ticket-de-carte-bancaire
[30] ISO 14443 Contactless Integrated Circuit Cards, “International standards
organisation,” 2011.
[31] L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, “Potential
misuse of nfc enabled mobile phones with embedded security elements
as contactless attack platforms,” ICITST IEEE International Conference
for Internet Technology and Secured Transactions, 2009.
[32] K. Markantonakis, L. Francis, G. Hancke, and K. Mayes, “Practical relay
attack on contactless transactions by using nfc mobile phones,” Radio
Frequency Identification System Security: RFIDsec, 2012.
[33] M. Emms, L. Freitas, and A. van Moorsel, “Rigorous design and im-
plementation of an emulator for emv contactless payments,” Computing
Science, Newcastle University, 2014.
[34] Channel 4 News, “Millions of barclays card users exposed
to fraud.” [Online]. Available: https://www.channel4.com/news/
millions-of-barclays-card-users-exposed-to-fraud
[35] U. B. Ceipidor, C. M. Medaglia, A. Marino, S. Sposato, and A. Moroni,
“Kernees: A protocol for mutual authentication between nfc phones and
pos terminals for secure payment transactions,” IEEE International ISC
Conference on Information Security and Cryptology (ISCISC), 2012.
[36] N. El Madhoun, F. Guenane, and G. Pujolle, “An online security protocol
for nfc payment: Formally analyzed by the scyther tool,” International
Conference on Mobile and Secure Services (MobiSec), pp. 1–7, 2016.

View publication stats

Vous aimerez peut-être aussi