home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: Tue, 12 Jan 1993 05:59:39 GMT
- From: rboudrie@chpc.org (Rob Boudrie)
- Newsgroups: comp.dcom.telecom
- Subject: Re: Good Opportunity For Fraud
- Message-ID: <telecom13.20.12@eecs.nwu.edu>
- Organization: Center For High Perf. Computing of WPI; Marlboro Ma
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 13, Issue 20, Message 12 of 17
- Lines: 24
-
- > I believe the bankcard passwords are also often in the clear in the
- > ISO mag stripe. Shudder! Remember having read something to that
- > effect on the net. Could some please deny ... please .. please!
-
- Denied. (You're welcome!)
-
- Bank card passwords are stored in encrypted form (one way encryption
- using the DES algorithm on a combination of the account number, user
- selected PIN and a few other things) which allows for local
- verification of passwords but only by your own bank. There are two
- different standards by which this is done, but each has a
- bank-specific encryption key (often refered to as the Pin Verification
- Key, or PVK). This key is kept highly confidential -- anyone with the
- key could generate the hashed pin for each possible password (only
- 10,000 in the typical four digit password) , compare each to the
- hashed value on the card, and decode the PIN that way.
-
- Your own back can verify the password within the ATM; other bank's ATM's
- must query your bank via the network.
-
-
- rob boudrie
-
-