Index_S


S

SDA
MAC-based, 392
off-line, 162-65
processing error, 275
signature-based, 393
See also Security mechanisms
Secret key wrapping, 376
Secure Hash Algorithm, 378
Secure messaging for confidentiality, 367
Secure socket layer (SSL), 5, 6, 26
Security, 24-34
application layer protocols, 306
CAM, 263-67
improved, 254-55
IP, 305
protection, in transaction profile, 76
remote card payment, 295-306
SET vs. TLS, 332-33
terminal cost and, 80
threats, 296-300
track 3
parameters, 23-24
transport layer (TLS), 26, 305-6
Security application module (SAM), 76
dynamic authenticator verification, 79
as issuer's remote agent, 78
support of, 78
Security framework, 359-61
cryptographic primitives, 360-61
illustrated , 359
interface decomposition, 359
security mechanisms, 360
security services, 360
threat analysis, 360
Security mechanisms, 360, 373-97
cardholder verification mechanisms, 387-92
cryptographic hash functions, 376-80
DDA mechanisms, 394-97
digital signature schemes, 380
encryption, 373-76
MDC, 377-79
public key certificates, 384-87
SDA mechanisms, 392-93
See also Security; Security framework
Security policies, 201-3
acquirer, 203
issuer, 202
Security politics, 233-36
defined, 233
in policy determination, 234
See also EMV ¢ regulatory framework
Security services, 300-304, 367-71
access control, 369
anonymity, 300-302
authenticode, 302
cardholder non- repudiation , 303-4, 369
confidentiality, 301, 367
data authentication, 301-2, 369
entity authentication (ES), 302-3, 367-68
realization, 304-6, 370-71
with secure channel, 370
with secure communications over insecure channel, 370-71
in security framework, 360
tamper resistance, 369
timeliness, 369
See also Remote card payment security
SELECT command, 104-6, 119, 120, 121
SET, 6
acceptability, 333-35
authentic and/or confidential channel, 317-19
certification authority, 313-15
channel establishment, 319
competitiveness , 336
data authentication, 320
digital certificates, 311
dual signatures, 321-22
entity authentication, 320
functional components , 335
infrastructure, 6
installing, registering, running, 334
model, 311
model illustration, 312
non-repudiation, 321
payment authorization, 323, 328-31
payment capture, 323-24, 331-32
payment method, 322-32
payments, 291-92
payment scheme setup, 311-15
public key certificates, 312-13
purchase processing, 323, 324-28
registration of participants , 315-16
remote transaction overview, 322-24
secure, channel, 317-21
security, 332-33
security comparison, 333
thin client architecture, 338-40
TLS vs., 336-40
See also Remote card payments
Settlement
defined, 49
institution, 15
organizations, 49
SHA-1 algorithm, 378
Sharable data objects, 250-51
defined, 250
mapping, 251
See also Data objects
Short Message Service (SMS), 420, 421
Signature-based SDA mechanism, 393
Signature generation
with digital signature with recovery, 411-12
with PKCS#1, 414-15
Signature verification
with digital signature with recovery, 412-13
with PKCS#1, 415
Signed static application data, 140-45
AFL, 141-42
defined, 125
generating, 143-44
issuing, 140-44
static data creation, 142-43
verification, 144-45
See also EMV ¢ certificates
Signing procedure, 381
Single message network, 44
Sniffing, 296-97
Static authenticator, 30-31
Static card authentication, 368
Static data authentication, 89
Subscriber Identity Module (SIM), 420
Application Toolkit (STK), 420, 421
defined, 420
Subsidiary account numbers (SANs), 22
Symmetric enciphered PIN verification, 389
Symmetric encryption, 374-75
Symmetric key cryptography, 76-80
System trace audit number (STAN), 35



Implementing Electronic Card Payment Systems
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
ISBN: 1580533051
EAN: 2147483647
Year: 2003
Pages: 131
Authors: Cristian Radu

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net