ISO 9564

ISO 9564 is an international standard for personal identification number (PIN) management and security in retail banking.

The PIN is used to verify the identity of a customer (the user of a bank card) within an electronic funds transfer system, and (typically) to authorize the transfer of funds. Therefore, it is important to protect such PINs against unauthorized disclosure or misuse. Modern banking systems require interoperability between different card issuers, acquiring banks and retailers including transmission of PINs between those entities so a common set of rules for handling and securing PINs is required, both to ensure technical compatibility and a mutually agreed level of security. ISO 9564 provides principles and techniques to meet these requirements.

ISO 9564 comprises four parts, under the general title of Financial services Personal Identification Number (PIN) management and security.[Note 1]

Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems

ISO 9564-1:2002[1] specifies the basic principles and techniques of secure PIN management. It includes both general principles and specific requirements.

(ISO 9564-1:2002 has been superseded by ISO 9564-1:2011 Basic principles and requirements for PINs in card-based systems.[2])

Basic principles

The basic principles of PIN management include:

PIN entry devices

The standard specifies some characteristics required (or recommended) of PIN entry devices (also known as PIN pads), i.e. the device into which the customer enters the PIN, including:

Other specific PIN control requirements

Other specific requirements include:

PIN length

The standard specifies that PINs shall be from four to twelve digits long, noting that longer PINs are more secure but harder to use. It also notes that not all systems support entry of PINs longer than six digits.

PIN selection

There are three methods of selecting or generating a PIN:

assigned derived PIN
The card issuer generates the PIN by applying some cryptographic function to the account number or other value associated with the customer. In this case the issuer need not - and should not - keep a record of the PIN, because it can be derived again when it needs to be verified.
assigned random PIN
The card issuer generates a PIN value using a random number generator.
customer-selected PIN
The customer selects the PIN value.

PIN issuance and delivery

The standard includes requirements for keeping the PIN secret while transmitting it, after generation, from the issuer to the customer. These include:

PIN encryption

To protect the PIN during transmission from the PIN entry device to the verifier, the standard requires that the PIN be encrypted, and specifies several formats that may be used. In each case, the PIN is encoded into a 64-bit PIN block, which is then encrypted by an "approved algorithm" (currently TDEA, according to part 2 of the standard).

The PIN block formats are:

Format 0

The PIN block is constructed by XOR-ing two 64-bit fields: the plain text PIN field and the account number field, both of which comprise 16 four-bit nibbles.

The plain text PIN field is:

The account number field is:

Format 1

This format should be used where no PAN is available. The PIN block is constructed by concatenating the PIN with a transaction number thus:

Format 2

Format 2 is for local use with off-line systems only (e.g. smart cards). It is specified in part 3 of the standard.

Format 3

Format 3 is the same as format 0, except that the "fill" digits are random values from 10 to 15, and the first nibble (which identifies the block format) has the value 3.

Part 2: Approved algorithms for PIN encipherment

ISO 9564-2[3] specifies which encryption algorithms may be used for encrypting PINs. The approved algorithms are:

Part 3: Requirements for offline PIN handling in ATM and POS systems

ISO 9564-3[4] specifies the requirements for handling and verifying PINs that are verified by a smart card itself, rather than being sent to the bank for verification.

PIN protection between entry device and smart card

The PIN entry device and the smart card reader that will verify the PIN may be integrated into a single physically secure unit, but they do not need to be. If they are not both part of an integrated secure unit, then the PIN shall be encrypted while it is transmitted from the PIN entry device to the card reader.

Independently of whether the PIN is encrypted from the entry device to the card reader, the PIN may be encrypted for transmission from the card reader to the card.

Physical security

Generally, the PIN entry device used for offline PIN handling should meet the same requirements as for online PIN handling, described in part 1. Additionally, the card reader should be constructed to prevent someone monitoring the communications to the card by inserting a monitoring device into the card slot.

PIN blocks

If the PIN is encrypted for transmission from the entry device to the card reader, it shall be encrypted using one of the PIN block formats specified in part 1 (i.e. format 0, 1 or 3).

The card reader shall always submit the PIN to the card encoded as a format 2 PIN block, whether or not it is encrypted. If it is encrypted, a unique key shall be used for each transaction.

Format 2 PIN block

The format 2 PIN block is constructed thus:

Part 4: Guidelines for PIN handling in open networks

ISO 9564-4[5] provides guidelines for PIN handling in open networks, i.e. in environments where issuers and acquirers have no direct control, or where no relationship exists between the PIN entry device and the acquirer prior to the transaction.

Notes

  1. The exact wording of this title varies between parts. This is the wording of the most recently published part.

References

This article is issued from Wikipedia - version of the Friday, June 19, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.