advertisement
advertisement

This is page 2 of:

Visa’s Retail Token Advice Of Token Value

October 8th, 2009

Peabody’s overall take on the Visa report is that while the document was not especially informative, it was at least a start, albeit a very tentative and vague start.

“The only thing that is significant is that this is the first step by the issuing team to weigh in on encryption at all,” Peabody said. “That team has been utterly silent throughout.”

Avivah Litan, one of Gartner’s top security analysts, said she found the document’s significance to be “in what it doesn’t say. It doesn’t say anything [specific] about encryption. It does say ‘use industry standards.’ That’s what’s so significant: It doesn’t say anything.”

The emphasis on supporting industry standards could be seen as a criticism of some of the proprietary approaches. But that’s a hard argument to make given that all of the vendor approaches will have to add on their own value-add, which by definition means there will be some proprietary elements involved.

“The Verifone approach is proprietary and Voltage is not a standard yet, so that is significant,” Litan said, adding that none of the vendor approaches has been “blessed by any standards body yet. [Visa] is not giving its blessing. It’s ‘use at your own risk.'”

One footnote in the report, although not providing any new information, did detail a concrete Visa guideline that is not especially well known: “Two key TDES (112-bits) should not process more than 1 million transactions. In cases where the number of transactions potentially processed through the system using a single 112-bits TDES key greatly exceeds 1 million, three key TDES (168-bits) or AES should be used. Note that key management schemes that greatly limit the number of transactions processed by a single key, such as Derived Unique Key Per Transaction (DUKPT) can be used to ensure that any individual key is used only a limited number of times.”


advertisement

2 Comments | Read Visa’s Retail Token Advice Of Token Value

  1. Steven Kendus Says:

    The best practices for data field encryption announced by Visa work toward developing a standard approach while offering guidance to payment solution providers. As Schuman points out, the document rehashed conventional wisdom and long-standing Visa and PCI best practices. However, there is definite value in the fact that Visa is actually weighing in and looking to provide some guidance. The five key implementation objectives outlined in the document provide some validation to tokenization approaches that are currently in production. Likewise, their stance that no single technology can completely solve for fraud has merit. Existing solutions that use both end-to-end encryption to encrypt card data from the point of sale, and tokenization on the back end of the transaction support their stance.

  2. Michael Cherry Says:

    Does VISA realize that lawsuits are coming and psychologists don’t get sued? I believe both of the following almost contradictory statements:
    1. Customer submitted credit cards are radioactive and they need to be immediately encrypted as they are swiped.
    2. Data centers that store data-at-rest can be designed to automatically identify and block breach attempts. Database encryption and the associated key management headaches are unnecessary.

    Michael Cherry, Cherry Biometrics Inc.
    Vice Chair, Digital Technology Committee
    National Association of Criminal Defense Lawyers

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.