[6257] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Debit card fraud in Canada

daemon@ATHENA.MIT.EDU (David Honig)
Mon Dec 13 16:30:30 1999

Message-Id: <3.0.5.32.19991213121242.007e6100@pop.sprynet.com>
Date: Mon, 13 Dec 1999 12:12:42 -0800
To: "Steven M. Bellovin" <smb@research.att.com>,
        Steve Reid <sreid@sea-to-sky.net>
From: David Honig <honig@sprynet.com>
Cc: cryptography@c2.net
In-Reply-To: <19991213154941.17F5C41F16@SIGABA.research.att.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 10:49 AM 12/13/99 -0500, Steven M. Bellovin wrote:
>true for credit cards?  If so, a simple visual recorder -- already used by 
>other thieves -- might suffice, and all the tamper-resistance in the world 
>won't help.  Crypto, in other words, doesn't protect you if the attack is on 
>the crypto endpoint or on the cleartext.

Wouldn't a thumbprint reader on the card (to authenticate the meat to the
smartcard)  be a tougher thing to shoulder surf?
Does raise the cost over a PIN.

Aren't there protocols where the exchange can't be replayed,
but proof-of-knowledge is demonstrated?

Or would these exchanges require on-line connectivity, thereby defeating
the utility of smartcards some?










  






home help back first fref pref prev next nref lref last post