At 10:49 13/12/1999 -0500, Steven M. Bellovin wrote:
>  If so, a simple visual recorder -- already used by
>other thieves -- might suffice, and all the tamper-resistance in the world
>won't help.  Crypto, in other words, doesn't protect you if the attack is on
>the crypto endpoint or on the cleartext.

This doesn't work. The PIN is derived by adding a "PIN Offset" which is 
stored on the magstripe to the "Real PIN" which is cryptographically 
derived from the account information. If you can't duplicate the magstripe 
the pin you have shoulder-surfed is useless. (To caveat my own words... 
this is one of the internationally standardised and widely deployed 
methods. I don't know how the other ones handle this problem.)

Greg.


Greg Rose                                     INTERNET: [EMAIL PROTECTED]
Qualcomm Australia        VOICE:  +61-2-9181-4851   FAX: +61-2-9181-5470
Suite 410, Birkenhead Point,             http://people.qualcomm.com/ggr/
Drummoyne NSW 2047    232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C

Reply via email to