| You are in: Sci/Tech | |||||||||||||||||||||
| Friday, 9 November, 2001, 00:08 GMT Security hole in cash machines ![]() Your Pin is vulnerable By BBC News Online technology correspondent Mark Ward A serious weakness has been discovered in the methods used by banks to protect the personal identification number (Pin) that lets you get money from a cash machine.
They warn that unscrupulous insiders could exploit these weaknesses to raid customer accounts. The researchers have called on banks to revise their security arrangements and use more open procedures to protect customers' cash. Bank raid Every time you use a cash machine a formidable array of security technology is used to protect the data being passed from the automatic teller machine (ATM) to the computers holding information about your account. At the heart of this process are devices called cryptoprocessors. These black boxes scramble the information you punch into the ATM so it cannot be intercepted as it travels along the wires. The cryptoprocessors also scramble the program that a bank's computers run when checking if the Pin number you submitted is valid. By doing this, banks hope to keep your Pin protected from snoopers. The physical construction of the cryptoprocessors is certified to a high standard to ensure that the boxes cannot be forced to give up the keys they use to scramble data. Any physical tampering with the boxes makes them destroy the keys they use. Crack attack But security researchers Michael Bond and Richard Clayton have found serious weaknesses in the software cryptoprocessors use to handle the encryption keys as they talk to different programs. These weaknesses could be exploited to gain access to keys, or to guide guesses about which key will unlock data. "What was once thought to be the strongest link in the chain is now being shown to be one of the weaker links," said Mr Bond. Typically encryption keys are hard to crack, or guess, because there are so many combinations to try. The vast amount of time it could take to try all possible combinations is a very good deterrent.
Properly implemented DES does a good job of protecting data. Hardware built by Richard Clayton can try 33 million keys per second, but would still take 70 years to be sure of unscrambling data encrypted with a DES key. However, using the clues provided by the leaky software, the cracking time can be reduced to just 24 hours. Using their combined techniques, the pair have even been able to get keys from an IBM 4758 cryptoprocessor previously thought to be invulnerable. Open banks "Cryptoprocessors are the mainstay of the banking world," said Mr Bond. "A lot of cryptoprocessors are built around the same design and they will have the same kind of faults." As well as protecting Pins, many financial organisations use them to protect credit and debit card transactions. Mr Bond said the weaknesses left banks open to attack by insiders with access to the cryptoprocessors. By far the majority of fraud committed against banks is carried out by employees of the financial institutions themselves. A survey carried out by Ernst and Young revealed that in 2000 almost 82% of all identified fraud was carried out by employees. "A crooked bank manager could duplicate our work on a Monday and be off to Bermuda by Wednesday afternoon," said Mr Clayton. To remedy the situation the researchers said banks needed to patch the software systems that handle the encryption keys and be more open with their security procedures. However, a spokesman for the banking body that oversees cash machine networks and bank transfers said the IBM 4758 was no longer in use. "This is a fascinating piece of work, but where it falls down is that the banks have moved on and nowadays PINs are produced randomly and not in relation to an account number," said a spokesman for the Association for Payment Clearing Services. "It won't work now in the UK," he said. | See also: Internet links: The BBC is not responsible for the content of external internet sites Top Sci/Tech stories now: Links to more Sci/Tech stories are at the foot of the page. | |||||||||||||||||||
Links to more Sci/Tech stories |
| ^^ Back to top News Front Page | World | UK | UK Politics | Business | Sci/Tech | Health | Education | Entertainment | Talking Point | In Depth | AudioVideo ---------------------------------------------------------------------------------- To BBC Sport>> | To BBC Weather>> ---------------------------------------------------------------------------------- © MMIII|News Sources|Privacy | ||