ISO 9564
Encyclopedia
ISO 9564 is an international standard
International standard
International standards are standards developed by international standards organizations. International standards are available for consideration and use, worldwide...

 for personal identification number
Personal identification number
A personal identification number is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Typically, the user is required to provide a non-confidential user identifier or token and a confidential PIN to gain access to the system...

 (PIN) management and security in retail banking.

The PIN is used to verify the identity of a customer (the user of a bank card
Bank card
A bank card is a plastic card issued by a bank to its clients that may perform one or more of the following services:* ATM card, card used for transactions at automatic teller machines* Debit card, card linked to a bank account and used for making purchases...

) within an electronic funds transfer
Electronic funds transfer
Electronic funds transfer is the electronic exchange or transfer of money from one account to another, either within a single financial institution or across multiple institutions, through computer-based systems....

 system, and (typically) to authorise the transfer of funds, so it is important to protect it against unauthorised disclosure or misuse. Modern banking systems require interoperability between different card issuers, acquiring bank
Acquiring bank
An acquiring bank is the bank or financial institution that processes credit and or debit card payments for products or services for a merchant. The term acquirer indicates that the bank accepts or acquires credit card transactions from the card-issuing banks within an association...

s and retailers – including transmission of PINs between those entities – so a common set of rules for handling and securing PINs is required, both to ensure technical compatibility and a mutually agreed level of security. ISO 9564 provides principles and techniques to meet these requirements.

ISO 9564 comprises four parts, under the general title of Financial services — Personal Identification Number (PIN) management and security.The exact wording of this title varies between parts. This is the wording of the most recently published part.

Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems

ISO 9564-1:2002 specifies the basic principles and techniques of secure PIN management. It includes both general principles and specific requirements.

(ISO 9564-1:2002 has been been superseded by ISO 9564-1:2011 Basic principles and requirements for PINs in card-based systems.)

Basic principles

The basic principles of PIN management include:
  • PIN management functions shall be implemented in software and hardware in such a way that the functionality cannot be modified without detection
    Tamper-evident
    Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings or other techniques may be tamper indicating.-Tampering:...

    , and that the data cannot be obtained or misused.

  • The PIN must always be stored encrypted or physically secured.

  • Encrypting the same PIN with the same key but for a different bank account
    Bank account
    A Bank account is a financial account recording the financial transactions between the customer and the bank and the resulting financial position of the customer with the bank .-Account types:...

     shall not predictably give the same cipher text.

  • Security of the PIN encryption shall depend on secrecy of the key, not secrecy of the algorithm
    Security through obscurity
    Security through obscurity is a pejorative referring to a principle in security engineering, which attempts to use secrecy of design or implementation to provide security...

    .

  • Only the customer (i.e. the user of a card) and/or authorised card issuer staff shall be involved with PIN selection or issuing. Where card issuer staff are involved, appropriate strictly enforced procedures shall be used.

  • A stored encrypted PIN shall be protected from substitution.

  • A PIN shall be revoked if it is compromised, or suspected to be.

  • The card issuer shall be responsible for PIN verification, but may delegate that responsibility to another institution.

  • The customer shall be advised of the importance of keeping the PIN secret.

PIN entry devices

The standard specifies some characteristics required (or recommended) of PIN entry devices (also known as PIN pads), i.e. the device into which the customer enters the PIN, including:
  • All PIN entry devices shall allow entry of the digits zero to nine. Numeric keys may also have letters printed on them, e.g. as per E.161
    E.161
    E.161 is an ITU-T recommendation that defines the assignment of the basic 26 Latin letters to the 12-key telephone keypad. Uses for this mapping include:* Multi-tap and predictive text systems* Forming phonewords from telephone numbers...

    . These letters are only for the customers' convenience; internally, the PIN entry device only handles digits. (E.g. the standard does not support multi-tap
    Multi-tap
    Multi-tap refers to a text entry system for mobile phones.The alphabet is printed under each key in a three-letter sequence as follows; ABC under 2 key, DEF under 3 key, etc. Exceptions are the "7" key, which adds a letter , and the "9" key which includes "Z"...

     or similar.) The standard also recommends that customers should be warned that not all devices may have letters.

  • The PIN shall not be displayed or disclosed by audible feedback.

  • The PIN entry device shall be physically secured so that it is not feasible to modify its operation or extract PINs or encryption keys from it.

  • The PIN entry device shall be designed or installed so as to prevent other people from observing the PIN as it is entered
    Shoulder surfing (computer security)
    In computer security, shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information...

    .

  • The keyboard layout should be standardized, with consistent and unambiguous labels for function keys, such as "enter", "clear" (this entry) and "cancel" (the transaction). The standard also recommends specific colours for function keys: green for "enter", yellow for "clear", red for "cancel".

Other specific PIN control requirements

Other specific requirements include:
  • All hardware and software used for PIN management functions shall be implemented such that:
    • Their correct functioning can be assured.
    • They cannot be modified or accessed without detection.
    • The data cannot be inappropriately accessed, modified or misused.
    • The PIN cannot be determined by a brute-force search
      Brute-force search
      In computer science, brute-force search or exhaustive search, also known as generate and test, is a trivial but very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's...

      .

  • The PIN shall not be communicated verbally. In particular bank personnel shall never ask the customer to disclose the PIN, nor recommend a PIN value.

  • PIN encryption keys shall not be used for any other purpose.

PIN length

The standard specifies that PINs shall be from four to twelve digits long, noting that longer PINs are more secure but harder to use. It also notes that not all systems support entry of PINs longer than six digits.

PIN selection

There are three methods of selecting or generating a PIN:

assigned derived PIN: The card issuer generates the PIN by applying some cryptographic function to the account number or other value associated with the customer. In this case the issuer need not - and should not - keep a record of the PIN, because it can derived again when it needs to be verified.

assigned random PIN: The card issuer generates a PIN value using a random number generator.

customer-selected PIN: The customer selects the PIN value.

PIN issuance and delivery

The standard includes requirements for keeping the PIN secret while transmitting it, after generation, from the issuer to the customer. These include:
  • The PIN shall be only be mailed in a PIN mailer, an envelope designed so that it can be printed without the PIN being visible (even at printing time) until the envelope is opened. A PIN mailer must also be constructed so that any prior opening will be obvious to the customer, who will then be aware that the PIN may have been disclosed.

  • The PIN shall never appear where it can be associated with a customer's account. For example the PIN mailer must not include the account number, but only sufficient information for its physical delivery (e.g. name and address). The PIN and the associated card shall not be mailed together, nor at the same time.

PIN encryption

To protect the PIN during transmission from the PIN entry device to the verifier, the standard requires that the PIN be encrypted, and specifies several formats that may be used. In each case, the PIN is encoded into an 64-bit
Block size (cryptography)
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. Block ciphers operate on a fixed length string of bits. The length of this bit string is the block size...

 PIN block which is then encrypted by an "approved algorithm" (currently TDEA, according to part 2 of the standard).

The PIN block formats are:
Format 0

The PIN block is constructed by XORing two 64-bit fields: the plain text PIN field and the account number field, both of which comprise 16 four-bit nibble
Nibble
In computing, a nibble is a four-bit aggregation, or half an octet...

s.

The plain text PIN field is:
  • 1 nibble with the value of 0, which identifies this as a format 0 block
  • 1 nibble encoding the length N of the PIN
  • N nibbles, each encoding one PIN digit
  • 14-N nibbles, each holding the "fill
    Padding (cryptography)
    -Classical cryptography:Official messages often start and end in predictable ways: My dear ambassador, Weather report, Sincerely yours, etc. The primary use of padding with classical ciphers is to prevent the cryptanalyst from using that predictability to find cribs that aid in breaking the...

    " value 15


The account number field is:
  • 4 nibbles with the value of zero
  • 12 nibbles containing the right-most 12 digits of the primary account number (PAN), excluding the check digit
    Check digit
    A check digit is a form of redundancy check used for error detection, the decimal equivalent of a binary checksum. It consists of a single digit computed from the other digits in the message....


Format 1

This format should be used where no PAN is available. The PIN block is constructed by concatenating the PIN with a transaction number thus:
  • 1 nibble with the value of 1, which identifies this as a format 1 block
  • 1 nibble encoding the length N of the PIN
  • N nibbles, each encoding one PIN digit
  • 14-N nibbles encoding a unique value, which may be a transaction sequence number, time stamp or random number

Format 2

Format 2 is for local use with offline systems only (e.g. smart cards). It is specified in part 3 of the standard.
Format 3

Format 3 is the same as format 0, except that "fill" digits are random, and the first nibble (which identifies the block format) has the value 3.

Part 2: Approved algorithms for PIN encipherment

ISO 9564-2 specifies which encryption algorithms may be used for encrypting PINs.

the only allowable algorithms are TDEA and RSA. Encryption with RSA is approved for use with ISO 9564-3 (offline PIN handling) only.

Part 3: Requirements for offline PIN handling in ATM and POS systems

ISO 9564-3 specifies the requirements for handling and verifying PINs that are verified by a smart card
Smart card
A smart card, chip card, or integrated circuit card , is any pocket-sized card with embedded integrated circuits. A smart card or microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile...

 itself, rather than being sent to the bank for verification.

PIN protection between entry device and smart card

The PIN entry device and the smart card reader that will verify the PIN may be integrated into a single physically secure unit, but they do not need to be. If they are not both part of an integrated secure unit, then the PIN shall be encrypted while it is transmitted from the PIN entry device to the card reader.

Independently of whether the PIN is encrypted from the entry device to the card reader, the PIN may be encrypted for transmission from the card reader to the card.

Physical security

Generally, the PIN entry device used for offline PIN handling should meet the same requirements as for online PIN handling, described in part 1. Additionally, the card reader should be constructed to prevent someone monitoring the communications to the card by inserting a monitoring device into the card slot.

PIN blocks

If the PIN is encrypted for transmission from the entry device to the card reader, it shall be encrypted using one of the PIN block formats specified in part 1 (i.e. format 0, 1 or 3).

The card reader shall always submit the PIN to the card encoded as a format 2 PIN block, whether or not it is encrypted. If it is encrypted, a unique key shall be used for each transaction.

Format 2 PIN block

The format 2 PIN block is constructed thus:
  • 1 nibble with the value of 2, which identifies this as a format 2 block
  • 1 nibble encoding the length N of the PIN
  • N nibbles, each encoding one PIN digit
  • 14-N nibbles, each holding the "fill" value 15

Part 4: Guidelines for PIN handling in open networks

ISO 9564-4 provides guidelines for PIN handling in open networks, i.e. in environments where issuers and acquirers have no direct control, or where no relationship exists between the PIN entry device and the acquirer prior to the transaction.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK