Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Agenda
PAYMENT & SECURITY TRENDS
E2EE: What is it?
“…is defined as the continuous protection of the
confidentiality and integrity of transmitted
informatio...
E2EE: The story so far…




                          Smart Card Alliance
                                   Sept 2009
KEY CONCEPTS OF TLE
en·cryp·tion /-'krip-sh&n/




In cryptography, encryption, is the process of transforming information to
make it unreadab...
MAC-ing is the process of “fingerprinting” data to allow any
tampering to be detected, where the fingerprint is encrypted ...
THE MALAYSIAN EXPERIENCE
Real Tapping Threats
Wire tapping threats
A brief look at history…
The Line Encryption Working Group
Design Parameters
Key
Considerations
Minimum Data Encryption Requirements
Encrypted Data Elements
     1. CVV
     2. CVV and PAN / Track2
Terminal Key Storage...
General Approaches

        Host-based         NAC-based          Interception-based
                              Host   ...
THE RESULTS
The Results…




               Source: Visa VPSS Payment Security Bulettin, 2006
The Results…




               Source: Visa VPSS Payment Security Bulettin, 2006
The Results…




               Source: Visa VPSS Payment Security Bulettin, 2006
The Results…




               Source: Visa VPSS Payment Security Bulettin, 2006
The Results…
Payments: The story today…




                     Source: BNM, 2009 Financial Stability and Payment Systems Report 2008
Payments: The story today

“…(card fraud) losses continued to be insignificant,
accounting for less than 0.04% of total ca...
PAYMENT SECURITY MYTHS
Encryption Myths
Summary: Considerations for TLE

 Addresses all threats

                                     Addresses Implementation iss...
Additional References

1. The Smart Card Alliance (http://www.smartcardalliance.org/)
2. PCI Security Standards Council
  ...
Net MATRIX Terminal Line Encryption
“Typical” Transaction Flow

                                                     Acquiring
                               ...
Encrypted Transaction Flow

                                                                 Acquiring
                   ...
Encrypted Transaction Flow II

                                                                Acquiring
                 ...
     
            
             
             
         
           
                    
             
 ...
Accolades & Accomplishments
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Upcoming SlideShare
Loading in …5
×

Ghl systems net matrix terminal line encryption 2009 2010

2,361 views

Published on

NetMATRIX (Multi-Application Transaction Routing and Identification eXchange) Terminal Line Encryption - is the complete solution for banks wishing to introduce terminal line encryption into their existing POS network infrastructure.

  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yxufevpm } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yxufevpm } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yxufevpm } ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/yxufevpm } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/yxufevpm } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/yxufevpm } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Ghl systems net matrix terminal line encryption 2009 2010

  1. 1. Agenda
  2. 2. PAYMENT & SECURITY TRENDS
  3. 3. E2EE: What is it? “…is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…” Computer Desktop Encyclopedia
  4. 4. E2EE: The story so far… Smart Card Alliance Sept 2009
  5. 5. KEY CONCEPTS OF TLE
  6. 6. en·cryp·tion /-'krip-sh&n/ In cryptography, encryption, is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (Wikipedia)
  7. 7. MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message Message Authentication Code
  8. 8. THE MALAYSIAN EXPERIENCE
  9. 9. Real Tapping Threats
  10. 10. Wire tapping threats
  11. 11. A brief look at history…
  12. 12. The Line Encryption Working Group
  13. 13. Design Parameters
  14. 14. Key Considerations
  15. 15. Minimum Data Encryption Requirements Encrypted Data Elements 1. CVV 2. CVV and PAN / Track2 Terminal Key Storage 2 2 4 2 3 4 1. Outside secure module 2. Within tamper reactive module MAC algorithm Key Usage Methodology ENC algorithm 1. Unique-key-per-terminal 2. Unique-key-per-session-per-term Key Differentiation 3. Unique-key-per-transaction Key Usage 4. Derived Unique Key Per Txn (DUKPT) Key Storage Key Differentiation 1. Same key for ENC & MAC ENC Data elements 2. Different key for ENC & MAC Encryption Algorithm 1. TEA – Tiny Encryption Algorithm 2. DES – Data Encryption Standard Highest Score: 2-2-4-2-3-4 3. 3DES/AES Lowest Score: 1-1-1-1-1-1 MAC Algorithm 1. No MAC 2. CRC32 + MAC 3. CRC32 + RMAC 4. SHA-1 + RMAC, or SHA-1 + AES MAC
  16. 16. General Approaches Host-based NAC-based Interception-based Host Host Host HSM SNAC NAC NAC NAC NAC NAC NAC NAC
  17. 17. THE RESULTS
  18. 18. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  19. 19. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  20. 20. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  21. 21. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  22. 22. The Results…
  23. 23. Payments: The story today… Source: BNM, 2009 Financial Stability and Payment Systems Report 2008
  24. 24. Payments: The story today “…(card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”
  25. 25. PAYMENT SECURITY MYTHS
  26. 26. Encryption Myths
  27. 27. Summary: Considerations for TLE Addresses all threats Addresses Implementation issues Addresses Deployment Issues Addresses Administration Issues Multi-channel & multi-device Support Vendor Independence Performance Cost-Effective Remote Key Injection
  28. 28. Additional References 1. The Smart Card Alliance (http://www.smartcardalliance.org/) 2. PCI Security Standards Council (https://www.pcisecuritystandards.org/) 3. Visa Best Practices, Data Field Encryption Version 1.0 (http://corporate.visa.com/_media/best-practices.pdf) 4. Secure POS Vendors Association (http://www.spva.org/index.aspx) 5. GHL Systems (http://www.ghl.com/netMATRIX )
  29. 29. Net MATRIX Terminal Line Encryption
  30. 30. “Typical” Transaction Flow Acquiring Net MATRIX Bank Credit Card Host NII: 160 Acquiring Host Issuing Switching NAC Bank Host 160 Message Remote NAC Remote NAC EDC Terminals
  31. 31. Encrypted Transaction Flow Acquiring Net MATRIX Bank Credit Card Host NII: 160 Acquiring Host 160 Enc Message NetMATRIX TLE NII: Issuing 161 Bank Switching NAC Host 161 Enc Message Remote NAC Remote NAC EDC Terminals
  32. 32. Encrypted Transaction Flow II Acquiring Net MATRIX Bank Credit Card Host NII: 160 Acquiring Host 160 Enc Message Issuing NetMATRIX TLE NII: Bank 161 Switching NAC Host 161 Enc Message Remote NAC Remote NAC EDC Terminals
  33. 33.                   
  34. 34. Accolades & Accomplishments

×