Updated: 24.11.2002; 13:42:15 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Friday, November 9, 2001

Security hole in cash machines

http://news.bbc.co.uk/hi/english/sci/tech/newsid_1645000/1645552.stm By BBC News Online technology correspondent Mark Ward

A serious weakness has been discovered in the methods used by banks to protect the number that lets you get money from a cash machine. Researchers from the University of Cambridge have found that the computer systems which check that these numbers are valid are easy to defeat. They warn that unscrupulous insiders could exploit these weaknesses to raid customer accounts. The researchers have called on banks to revise their security arrangements and use more open procedures to protect customers' cash.

... The physical construction of the cryptoprocessors is certified to a high standard to ensure that the boxes cannot be forced to give up the keys they use to scramble data. Any physical tampering with the box makes them destroy the keys they use. [However,] security researchers Michael Bond and Richard Clayton have found serious weaknesses in the software cryptoprocessors use to handle the encryption keys as they talk to different programs. ... using the clues provided by the leaky software, the cracking time can be reduced to just 24 hours.

Andrew Brydon, Systems & Software Safety Analyst, Lancashire, UK [Andrew Brydon via risks-digest Volume 21, Issue 74]
0:00 # G!


Maximillian Dornseif, 2002.
 
November 2001
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30  
Oct   Dec

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.