02. Cryptosec Rkl

Embed Size (px)

DESCRIPTION

Cryptosec Rkl

Citation preview

  • Cryptosec RKL

    Executive Summary

  • Cryptosec RKL | NDEX 2

    NDEX

    INTRODUCTION ........................................................................................................................................ 3

    Payment Media Security ........................................................................................................................... 4

    INDUSTRY STANDARDS AND SPECIFICATIONS .......................................................................................... 6

    RKL Migration Impact ............................................................................................................................... 8

    The Realsec Solution ................................................................................................................................. 9

    RKL Server Operating Model ................................................................................................................ 10

    Cryptosec RKL Overview ...................................................................................................................... 11

    Opportunities And Benefits .................................................................................................................... 13

  • Cryptosec RKL | / INTRODUCTION 3

    INTRODUCTION

    In this document, we present the bid of Cryptosec-RKL Server from Realsec, a

    multivendor system for remote loading of the ATMs Initial Keys, using techniques of

    certificates and electronic signatures with asymmetric key.

    In the following chapters we explain the features of Cryptosec-RKL and describe its

    technical architecture, and define the system requirements.

  • Cryptosec RKL | Payment Media Security 4

    Payment Media Security

    With the aim of achieving confidentiality, integrity and non-repudiation of electronic

    transactions, it is necessary to protect by cryptographic coding processes, certain

    sensitive information, such as the PIN - the customers secret personal number.

    The security of a cryptographic system is based on the secrecy of the keys that are

    used to encrypt the transmission of sensitive data between a Point of Sale terminal,

    which initiates a transaction and a Host remains secret.

    For this purpose, the keys used in cryptographic procedures must be stored in a

    physically secure device, i.e. in a cryptographic module, which in the case of POS is

    called Pinpad and in self-services terminals - EPP.

    Brand names(VISA and MasterCard) and financial networks define a set of security

    requirements which specify not only the physical security requirements to be met by the

    devices used for keying the PIN and handling sensitive information but also the

    techniques for managing the secret keys and cryptographic algorithms to be used.

    Physical security requirements:

    Brands define the Pinpad and the EPP as physically secure devices, that should prevent

    (Tamper resistant) and also detect (tamper-evident) fraudulent attacks, in a way that it is non-viable to penetrate the device without causing serious damages and

    going unnoticed subsequently, in addition to requiring the frustration of any attacks as

    soon as they are detected.

    Logical security requirements:

    Some of the logical security requirements demand that the PIN entry devices are

    designed in such away that:

    o It is unfeasible to reveal the entered or contained secret information, neither

    through some determined function nor through a particular combination of

    functions.

    o The PIN encryption key is not to be used for any other cryptographic purpose

    except for encryption of PIN blocks.

    o The PIN encryption key shall be unique for each device.

    o The PINs shall be encrypted inside the Pinpad.

    o The device should implement protection against exhaustive PIN search attempts.

    Key Management requirements:

    The rules also define the key management techniques to be used during the entire life

    cycle of the keys, from the moment of its generation until its destruction.

    In their Rules and Security Standards, Visa and MasterCard pay also special attention to

    the techniques to be used to transfer the keys into the EPP security module in order to

    preserve their integrity.

  • Cryptosec RKL | Payment Media Security 5

    Therefore, it is required that they are always transmitted encrypted with other keys that

    are already installed in the EPP. However, the problem arises when it is needed to be

    entered the very first key (the Initial or Master Key) of the defined key hierarchy into the

    EPP, since there is no any other key at this moment in the security module.

    The traditional method for loading the initial key that resolves this problem is the

    separation of the key into at least two key components and shipping them to the

    custodians by using different channels of communication, thereby fulfilling the principle

    of partial knowledge and dual control.

    However, the complicated logistics and inefficiency (proper of all manual processes)

    makes the manual loading procedure for a relatively large number of ATMs, if done in

    compliance with all the requirements of VISA (T&L expenses, staff hours, etc. registering

    every process involved for later VISA auditing) will translate into a tedious administrative

    burden and increased cost for Financial Institutions.

  • Cryptosec RKL | Industry Standards and Specifications 6

    Industry Standards and Specifications

    In the mid-90s, important standards and specifications that govern the policies on logical security with regard to the management of PIN and passwords were created.

    ANSI X9

    The X9 series, published and reviewed by the X9 committee, formed the basis for many

    posterior specifications

    Recently there have been three major changes in two of the standards ANSI X9.8 Y

    ANSI X9.24 which

    state that:

    The PIN must be encrypted with a double key (16 bytes or 32 characters) hence

    therequirement to use TDES for the encryption of the PIN.

    Any key that encrypts another key must be a double length key. From this

    requirement stems the fact that the Initial Key is 16 bytes, because the other

    keys of the key hierarchy depend on this Initial Key.

    Use of unique keys for each EPP device.

    Coinciding in time, the concerns of the industry regarding traditional techniques for

    loading keys, with the available technology of asymmetric cryptography, the VISA and

    Master Card also initiated a review of the ANSI X9.24 standard:

    Symmetric Key Management using asymmetric cryptographic techniques ANSI

    X9.24-2

    in order to include the functionality of remote key loading of the initial symmetric key

    using public cryptography techniques, thus defining a new framework for security and

    global acceptance.

    The remote key loading allows for the elimination of a lot of costs that would have been

    incurred by using the manual process, as it eliminates the need to move staff to transfer

    the keys in the EPP, its handling as well as management.

    Besides, based on the technology of asymmetric cryptography and digital

    certificates/signatures, the RKL enables Bilateral Authentication and establishment of a

    secure session with the Host before the downloading of the Initial Key.

    Financial Organizations, however, did not have all their needs satisfied by the standard

    X9.24 as they also required interoperability and widespread functionality. The

    fundamental problem is that the X9.24 does not define the interface, neither the

    implementation details of the Remote Key Loading scheme and it does not allow for an

    approximation towards a unique interface for the different ATM manufacturers.

    The main consequence of this lack of specificity has been that each manufacturer has

    implemented a

    different Remote Key Loadings scheme using signatures(NCR and Wincor),

    certificates(Diebold), or legacy systems (Fujitsu).

    XFS SPECIFICATIONS

  • Cryptosec RKL | Industry Standards and Specifications 7

    The XFS standard consists basically of a set of specifications for access to financial

    devises (pinpads, receipt printers, card readers, dispensers, etc.) defined around

    Microsoft Windows programming, with the aim of ensuring that the financial

    applications become independent of the underlying device hardware which they

    access.

    At the same time that the revision 2 of the X9.24 standard was published, a parallel

    revision of the XFS standard was initiated to include the functionality of the remote

    loading keys. However, each of the manufacturers had already implemented a

    different interface of the functionality of the remote loading keys.

    Currently, in the last revision of the XFS 3.3 standard, the Diebold (based on certificates)

    and NCR (based on signatures) Remote Key Loading schemes have been included

    making these two standards de facto.

    This scenario raises the issue of Financial Institutions need to implement a remote loading key solution for each of their suppliers, while at the same time taking into

    account upgrading developments in accordance with standards evolution and

    emerging technologies.

  • Cryptosec RKL | RKL Migration Impact 8

    RKL Migration Impact

    Host

    Upgrading the HSM (Host Security Module) firmware with new cryptographic

    algorithms and functions (RSA)

    Host Processes integration and developments.

    ATM

    Self-service processes integration and developments

    Changes in the financial protocols POS/ATM/ networks.

    Migration to XFS 3.3 Standard.

    PinPAD

    PCI Certification

    Unique RSA key pair

    Mechanism for authenticating the Host public RSA key component by means of

    signatures or certificates.

    Thus, to carry out migration to the remote loading keys, Financial institutions are bound

    o undertake changes at hardware level (including new HSM, EPP or firmware) and at

    software level (new developments in the Host and Self-service applications).

    In order to minimize the impact of migration, Diebold has designed a solution that

    eliminates the need to make changes in the hardware and software in the Host and in

    the self-service application.

  • Cryptosec RKL | The Realsec Solution 9

    The Realsec Solution

    The solution proposed by Realsec is a Remote Key Distribution Server (hereinafter, server

    Cryptosec- RKL or RKL), which implements the RKL schemes of the major ATM

    manufacturers (Diebold, NCR,Wincor and Fujitsu) and provides:

    An open and multi-vendor solution

    Independence of the Host processes

    Based on XFS standart

    This solution does not require changes in the hardware and software in the Host when it

    comes to integrating this project with the Host operations and processes, also, the need

    does not arise to make changes in the current self-service application.

    It is therefore a solution that possesses complete autonomy and does not require any

    integration with the Host systems and ATM

  • Cryptosec RKL | RKL Server Operating Model 10

    RKL Server Operating Model

    The Cryptosec-RKL solution consists of different software modules that run on a RACK,

    except for an agent that runs on the ATM.

    The Cryptosec-RKL uses a security tamperresistant and tamper-responsive module HSM, in which protected memory is generated in random way the Initial key of all the

    ATMs and the secret component of the Host RSA key pair.

    As mentioned above, a component (Cryptosec Agent) is installed in each ATM, which

    during the start-up of the Self-service initiates a RKL request to the RKL Server for the

    loading of the Initial Key, if the status of the EPP indicates it has not been initialized with

    the key hierarchy yet).

    On reception of a RKL request

    from an ATM, the Cryptosec-

    RKL carries out at first the

    process of mutual

    authentication between the

    ATM and the RKL Server, to

    ubsequently establish a

    secure session and send the

    corresponding Initial Master

    key of that ATM.

    On completion of the

    transmission session of the

    Initial key for the ATM in

    question, the Cryptosec- RKL

    communicates the Initial Key

    to the HSM/Host.

    The ATM is now prepared to

    launch financial operations

    against the Host in the

    habitual manner without any necessity from now on to communicate with the

    Cryptosec-RKL, as long as the equipment being referred to has not had its

    software reinstalled or its EPP decommissioned.

    In the latter two cases just mentioned, the RKL request will be launched again by the

    Selfservice application, in a transparent and automatic manner without involvement

    neither of the technical staff nor of the bank branchs staff.

  • Cryptosec RKL | Cryptosec RKL Overview 11

    Cryptosec RKL Overview

    CRYOTOSEC-RKL SOFTWARE COMPONENTS

    Rt-Core

    Receives and processes RKL requests from the installed base or group of ATMs. It is

    responsible for HSM crypto primitive programming, so as to provide the required

    functionality according to RKL specific scheme of each of the self-service

    manufacturers. Among its main characteristics we can enumerate the support

    provided for the establishment of the secure session (Bilateral Authentication) and the

    transport of the initial key to the installed base or group of ATMs.

    Rt-Interfaces

    The Cryptosec-RKL solution communicates with the RKL agents that resides in each

    Self-service via interfaces. The interfaces carry out communications between the

    Cryptosec RKL Server Server system and the outside world. They are responsible for

    executing the specific RKL protocol for each and every manufacturer, by first carrying

    out Bilateral Authentication, and later by using the secure channel established to

    transmit the initial key of the Self-service. All messages sent between RtCore and

    RtInterfaces, are formatted according to a specific protocol of each manufacturer. The

    communication between the RtInterfaces and the agents in the Self-services will be

    realized using the

    TCP/IP standard as the communications protocol.

    Rt-Office

    The Component responsible for data base management processes and handling of

    necessary data for the correct functioning of the system and reports generation.

  • Cryptosec RKL | Cryptosec RKL Overview 12

    Rt-Admin

    This GUI admin module permits the configuration of the RKL Server solution and its

    management for optimal functioning.

    Rt-Agent

    A component residing in the ATM that determines during start-up the need to initiate

    the process of requesting the initial key from Cryptosec RKL Server.

    HSMConsole

    HSM Management console, through this console, users of the HSM and their rights of

    access can be defined, as well as the importation of the Zone Transport Keys

    generated by the HSM of the Host, according to the principles of dual control and split

    knowledge.

  • Cryptosec RKL | Opportunities And Benefits 13

    Opportunities And Benefits

    With the solution provided by Diebold there is a minimization of the impact posed by

    migration to RKL for financial institutions thus freeing them of the technical complexity

    involved in the realization of new developments.

    The automation of the process ensures compliance with safety standards.

    Elimination of the manual key entry process that requires personnel and transport of the

    same.

    The interoperability at a global level is beneficial for the financial institution and

    provides flexibility in their choice of ATMs to buy.

    Nevertheless, the greatest benefit of the adaptation to RKL, is the drastic reduction in

    the total cost of operations, but by no means should we despise or underestimate the

    opportunity that the financial institutions would have in terms of gaining in image and

    being prepared to confront new challenges in the future in the payment media

    industry.

  • Cryptosec RKL | Opportunities And Benefits 14