Introducing TLS-PSK Authentication for EMV devices

  • Pascal Urien

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Access control to online banking accounts is a very critical topic for the always-on emerging society. In order to avoid phising threats resulting from classical mechanisms dealing with login and password tuples, the deployment of two-factor authentication tokens generating One Time Password (OTP) is recommended by many governmental organizations. A procedure based on EMV credit cards (the Chip Authentication Program) is proposed by several financial companies. However, due to passwords lifetime, OTP values may be collected by hackers via phishing attacks. In this paper we present a protocol that merges the CAP approach to the TLS-PSK protocol. As a consequence there is no need to collect OTP values, and phishing attacks don't work, because the mutual authentication between the card bearer and the WEB site is only performed via the SSL session.

Original languageEnglish
Title of host publication2010 International Symposium on Collaborative Technologies and Systems, CTS 2010
Pages371-377
Number of pages7
DOIs
Publication statusPublished - 16 Jul 2010
Event2010 International Symposium on Collaborative Technologies and Systems, CTS 2010 - Chicago, IL, United States
Duration: 17 May 201021 May 2010

Publication series

Name2010 International Symposium on Collaborative Technologies and Systems, CTS 2010

Conference

Conference2010 International Symposium on Collaborative Technologies and Systems, CTS 2010
Country/TerritoryUnited States
CityChicago, IL
Period17/05/1021/05/10

Keywords

  • EMV
  • Security
  • Smart card
  • TLS
  • WEB

Fingerprint

Dive into the research topics of 'Introducing TLS-PSK Authentication for EMV devices'. Together they form a unique fingerprint.

Cite this