In message <[EMAIL PROTECTED]>, Steve Reid writes:
> A real-world example of the fact that cryptography is only part of the
> equation, and "tamper-proof" devices are not necessarily so.
>
> Article: http://www.globeandmail.ca/gam/National/19991210/UDEBIN.html
> Mirror: http://www.efc.ca/pages/media/globe.10dec99.html
I personally would like a clearer explanation of just what happened, and what
the "tamper-proof" devices were.
As I read the article, the attack involved subversion of the swipe card
readers. The modified versions apparently recorded both the mag stripe
information and the user's PIN. Are the readers supposed to be
tamper-resistant? Is the account information on the face of the card, as is
true for credit cards? If so, a simple visual recorder -- already used by
other thieves -- might suffice, and all the tamper-resistance in the world
won't help. Crypto, in other words, doesn't protect you if the attack is on
the crypto endpoint or on the cleartext.
This incident might be the trigger that will force smart card deployment. The
problem has always been that the threats were not severe enough to pay for the
conversion cost. Perhaps they now are.
--Steve Bellovin