Optimised to Fail: Card Readers for Online Banking

  • Authors:
  • Saar Drimer;Steven J. Murdoch;Ross Anderson

  • Affiliations:
  • Computer Laboratory, University of Cambridge, UK;Computer Laboratory, University of Cambridge, UK;Computer Laboratory, University of Cambridge, UK

  • Venue:
  • Financial Cryptography and Data Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer's debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.