Abstract | ||
---|---|---|
This paper looks at relay attacks against contactless payment cards, which could be used to wirelessly pickpocket money from victims. We discuss the two leading contactless EMV payment protocols (Visa's payWave and MasterCard's PayPass). Stopping a relay attack against cards using these protocols is hard: either the overhead of the communication is low compared to the (cryptographic) computation by the card or the messages can be cached before they are requested by the terminal. We propose a solution that fits within the EMV Contactless specification to make a payment protocol that is resistant to relay attacks from commercial off-the-shelf devices, such as mobile phones. This solution does not require significant changes to the cards and can easily be added to existing terminals. To prove that our protocol really does stop relay attacks, we develop a new method of automatically checking defences against relay attacks using the applied pi-calculus and the tool ProVerif. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-662-47854-7_11 | Lecture Notes in Computer Science |
Field | DocType | Volume |
Relay attack,Cryptography,Computer science,Cache,Computer security,Smart card,Payment card,Mobile phone,Payment,Relay | Conference | 8975 |
ISSN | Citations | PageRank |
0302-9743 | 7 | 0.51 |
References | Authors | |
13 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tom Chothia | 1 | 441 | 29.82 |
Flavio D. Garcia | 2 | 438 | 33.08 |
Joeri de Ruiter | 3 | 136 | 14.99 |
Jordi van den Breekel | 4 | 7 | 0.51 |
Matthew Thompson | 5 | 7 | 0.51 |