Cash transfers are trickier and less safe with the rise in our transac-
tions because we have to carry vast quantities of cash and currency.
As a result, banks give us today the ability to create an account linked
to our debit/credit accounts and give us a variety of nancing options,
for instance, bank cards, banknotes, and money exchanges, to oper-
ate comfortably with our funds, and ensure that we are smooth and
e ective at the disposal of money only.
Without a question, the method of bank payment will be used any-
where and wherever, and in the event of abuse or theft, we simply need
to contact the bank and interrupt the process of payment. Studies
demonstrate that a credit card is known to be the simplest and most
secure mode of payment, as it's easy to get from banks, is limited in
size, and provides assistance and insurance.
However, when we were using cards, there was still a signicant risk
of theft. Because as science progresses from a positive point of view,
it often followed with a negative perspective.
Initially, the cards used the signatures to validate the transaction at
the point of sale (POS). However, the signatures are easy to lose, so
the possibility of fraud is present. This issue has been solved in recent
years with the existence of an EMV smart card that comes with an
embedded ICC, this card enables the verify the customer/cardholder.
The card makes transactions in shops where the customer and the
retailer are in the same location, and the payment system of the mer-
chant is represented by a POS terminal. The payment in a market
can be made in two individual instances: contact and contactless. It
also facilitates the manual insertion of the bank information stored on
the card on the merchant's website to make online purchases. In case
the client and the supplier are not in a common location the online
payment is made remotely.
In this thesis, we will talk about EMV security protocol and its au-
thentication techniques. We will go through its security
aws, and we
will study, in detail, one of its major attacks called \Card Cracking
Attack". Finally, we will propose our technical solution to solve that
threat.
As future work, we plan to design one model containing the EMV
contact and contactless models to study the cross-protocol executions.
We also plan to further rene and extend our solution.
Keywords: EMV smart card, Point of Sale, Integrated Circuit Chip,
Authentication techniques, Primary Account Number, Personal Iden-
tication Number, Card Verication Value, Card Cracking Attack.