Researchers see pitfalls in no-swipe credit
They call it the "Johnny Carson attack," for his comic pose as a
psychic divining the contents of an envelope.
Tom Heydt-Benjamin tapped an envelope against a black plastic box
connected to his computer. Within moments, the screen showed a garbled
string of characters that included this: fu/kevine, along with some
numbers.
Mr. Heydt-Benjamin then ripped open the envelope. Inside was a credit
card, fresh from the issuing bank. The card bore the name of Kevin E.
Fu, a computer science professor at the University of Massachusetts,
Amherst, who was standing nearby. The card number and expiration date
matched those numbers on the screen.
The demonstration revealed potential security and privacy holes in a
new generation of credit cards - cards whose data is relayed by radio
waves without need of a signature or physical swiping through a machine.
Tens of millions of the cards have been issued, and equipment for their
use is showing up at a growing number of locations, including CVS
pharmacies, McDonald's restaurants and many movie theaters.
The card companies have implied through their marketing that the data
is encrypted to make sure that a digital eavesdropper cannot get any
intelligible information. American Express has said its cards
incorporate "128-bit encryption," and J.
P. Morgan Chase has said that its cards, which it calls Blink, use
"the highest level of encryption allowed by the U.S. government."
But in tests on 20 cards from Visa, MasterCard and American Express,
the researchers here found that the cardholder's name and other data was
being transmitted without encryption and in plain text.They could skim
and store the information from a card with a device the size of a couple
of paperback books, which they cobbled together from readily available
computer and radio components for $150.
They say they could probably make another one even smaller and
cheaper: about the size of a pack of gum for less than $50.
And because the cards can be read even through a wallet or an item of
clothing, the security of the information, the researchers say, is
startlingly weak. "Would you be comfortable wearing your name, your
credit card number and your card expiration date on your T-shirt?" Mr.
Heydt-Benjamin, a graduate student, asked.
Technical exercise
"This is an interesting technical exercise," said Brian Triplett,
senior vice president for emerging-product development for Visa, "but as
a real threat to a consumer - that threat really doesn't exist." The
finding comes at a time of strong suspicion among privacy advocates and
consumer groups about the security of the underlying technology, called
radio frequency identification, or RFID.
Though the systems are designed to allow a card to be read only in
close proximity, researchers have found that they can extend the
distance.The experiment was conducted by researchers here working with
RSA Labs, a part of EMC, an information management and storage company.
The resulting paper, which has been submitted to a computer security
conference, is the first fruit of a new consortium of industry and
academic researchers financed by the National Science Foundation to
study RFID.
Security experts who were not involved in the research have praised
the paper, and said that they were startled by the findings. Aviel D.
Rubin, a professor of computer security at Johns Hopkins University,
said, "There is a certain amount of privacy that consumers expect, and I
believe that credit card companies have crossed the line."
The companies, however, argue that testing just 20 cards does not
provide an accurate picture of the card market, which generally uses
higher security standards than the cards that were tested. "It's a small
sample," said Art Kranzley, an executive with MasterCard.
Chips like those used by the credit card companies can encrypt the
data they send, but that can slow down transactions and make building
and maintaining the payment networks more expensive. Other systems,
including the Speedpass keychain device offered by Exxon Mobil, encrypt
the transmission - though Exxon came under fire for using encryption
that experts said was weak.
Information on cards
Though information on the cards may be transmitted in plain text, the
company representatives argued, the process of making purchases with the
cards involves verification procedures based on powerful encryption that
make each transaction unique.
Most cards, they said, actually transmit a dummy number that does not
match the number embossed on the card, and that number can be used only
in connection with the verification "token," or a small bit of code,
that is encrypted before being sent.
"It's basically useless information," said David Bonalle, vice
president and general manager for advanced payments at American Express.
"You can't steal that data and just play it back and expect that
transaction to work." Mr. Heydt-Benjamin, in fact, was able to purchase
electronic equipment online using a number skimmed from a card he
ordered for himself and which was sealed in an envelope.
Visa and American Express representatives said all their cards
conformed to the highest security standard.
(NYtimes online)
|