HOME

TheInfoList



OR:

ISO 9564 is an
international standard international standard is a technical standard developed by one or more international standards organizations. International standards are available for consideration and use worldwide. The most prominent such organization is the International Or ...
for
personal identification number A personal identification number (PIN), or sometimes redundantly a PIN number or PIN code, is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to facilitat ...
(PIN) management and security in
financial services Financial services are the Service (economics), economic services provided by the finance industry, which encompasses a broad range of businesses that manage money, including credit unions, banks, credit-card companies, insurance companies, acco ...
. The PIN is used to verify the identity of a customer (the user of a
bank card A bank card is typically a plastic card issued by a bank to its clients that performs one or more of a number of services that relate to giving the client access to bank account. Physically, a bank card will usually have the client's name, the ...
) within an
electronic funds transfer Electronic funds transfer (EFT) is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of b ...
system, and (typically) to authorize the transfer or withdrawal of funds. Therefore, it is important to protect PINs against unauthorized disclosure or misuse. Modern banking systems require interoperability between a variety of PIN entry devices,
smart cards A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
, card readers,
card issuer An issuing bank is a bank that offers card association branded payment cards directly to consumers, such as credit cards, debit cards, contactless devices such as key fobs as well as prepaid cards. The name is derived from the practice of issuing ca ...
s,
acquiring bank An acquiring bank (also known simply as an acquirer) is a bank or financial institution that processes credit or debit card payments on behalf of a merchant. The acquirer allows merchants to accept credit card payments from the card-issuing banks ...
s and
retailers Retail is the sale of goods and services to consumers, in contrast to wholesaling, which is sale to business or institutional customers. A retailer purchases goods in large quantities from manufacturers, directly or through a wholesaler, and t ...
– including transmission of PINs between those entities – so a common set of rules for handling and securing PINs is required, to ensure both technical compatibility and a mutually agreed level of security. ISO 9564 provides principles and techniques to meet these requirements. ISO 9564 comprises three parts,Parts 1, 2 and 4. Part 3 was withdrawn in 2011. under the general title of ''Financial services — Personal Identification Number (PIN) management and security''.


Part 1: Basic principles and requirements for PINs in card-based systems

ISO 9564-1:2011 specifies the basic principles and techniques of secure PIN management. It includes both general principles and specific requirements.


Basic principles

The basic principles of PIN management include: * PIN management functions shall be implemented in software and hardware in such a way that the functionality cannot be modified without detection, and that the data cannot be obtained or misused. * Encrypting the same PIN with the same key but for a different
bank account A bank account is a financial account maintained by a bank or other financial institution in which the financial transactions between the bank and a customer are recorded. Each financial institution sets the terms and conditions for each type o ...
shall not predictably give the same cipher text. * Security of the PIN encryption shall depend on secrecy of the key, not secrecy of the algorithm. * The PIN must always be stored
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
or physically secured. * Only the customer (i.e. the user of a card) and/or authorized card issuer staff shall be involved with PIN selection or issuing. Where card issuer staff are involved, appropriate strictly enforced procedures shall be used. * A stored encrypted PIN shall be protected from substitution. * A PIN shall be revoked if it is compromised, or suspected to be. * The card issuer shall be responsible for PIN verification. * The customer shall be advised of the importance of keeping the PIN secret.


PIN entry devices

The standard specifies some characteristics required or recommended of ''PIN entry devices'' (also known as
PIN pad A PIN pad or PIN entry device (PED) is an electronic device used in a debit, credit or smart card-based transaction to accept and encrypt the cardholder's personal identification number (PIN). PIN pads are normally used with payment terminals, a ...
s), i.e. the device into which the customer enters the PIN, including: * All PIN entry devices shall allow entry of the digits zero to nine. Numeric keys may also have letters printed on them, e.g. as per
E.161 E.161 is an ITU-T Recommendation that defines the arrangement of digits, letters, and symbols on telephone keypads and rotary dials. It also defines the recommended mapping between the basic Latin alphabet and digits (e.g., "DEF" on 3). Uses f ...
. These letters are only for the customers' convenience; internally, the PIN entry device only handles digits. (E.g. the standard does not support
multi-tap Multi-tap (multi-press) refers to a text entry system for mobile phones. The alphabet is printed under each key (beginning on "2") in a three-letter sequence as follows; ABC under 2 key, DEF under 3 key, etc. Exceptions are the "7" key, which ...
or similar.) The standard also recommends that customers should be warned that not all devices may have letters. * The PIN entry device shall be physically secured so that it is not feasible to modify its operation or extract PINs or
encryption key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key c ...
s from it. * The PIN entry device should be designed or installed so as to prevent other people from observing the PIN as it is entered. * The keyboard layout should be standardized, with consistent and unambiguous labels for function keys, such as "enter", "clear" (this entry) and "cancel" (the transaction). The standard also recommends specific colours for function keys: green for "enter", yellow for "clear", red for "cancel".


Smart card readers

A PIN may be stored in a secure
smart card A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
, and verified
offline In computer technology and telecommunications, online indicates a state of connectivity and offline indicates a disconnected state. In modern terminology, this usually refers to an Internet connection, but (especially when expressed "on line" or ...
by that card. The PIN entry device and the
reader A reader is a person who reads. It may also refer to: Computing and technology * Adobe Reader (now Adobe Acrobat), a PDF reader * Bible Reader for Palm, a discontinued PDA application * A card reader, for extracting data from various forms of ...
used for the card that will verify the PIN may be integrated into a single physically secure unit, but they do not need to be. Additional requirements that apply to smart card readers include: * The
card reader A card reader is a data input device that reads data from a card-shaped storage medium. The first were punched card readers, which read the paper or cardboard punched cards that were used during the first several decades of the computer industry ...
should be constructed in such a way as to prevent someone monitoring the communications to the card by inserting a monitoring device into the card slot. * If the PIN entry device and the card reader are not both part of an integrated secure unit, then the PIN shall be encrypted while it is transmitted from the PIN entry device to the card reader.


Other specific PIN control requirements

Other specific requirements include: * All hardware and software used for PIN processing shall be implemented such that: ** Their correct functioning can be assured. ** They cannot be modified or accessed without detection. ** The data cannot be inappropriately accessed, modified or misused. ** The PIN cannot be determined by a
brute-force search In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique and algorithmic paradigm that consists of systematically enumerating all possible candidates for the soluti ...
. * The PIN shall not be communicated verbally. In particular bank personnel shall never ask the customer to disclose the PIN, nor recommend a PIN value. * PIN encryption keys should not be used for any other purpose.


PIN length

The standard specifies that PINs shall be from four to twelve digits long, noting that longer PINs are more secure but harder to use. It also suggests that the issuer should not assign PINs longer than six digits.


PIN selection

There are three accepted methods of selecting or generating a PIN: ;assigned derived PIN: The card issuer generates the PIN by applying some cryptographic function to the account number or other value associated with the customer. ;assigned random PIN: The card issuer generates a PIN value using a
random number generator Random number generation is a process by which, often by means of a random number generator (RNG), a sequence of numbers or symbols that cannot be reasonably predicted better than by random chance is generated. This means that the particular out ...
. ;customer selected PIN: The customer selects the PIN value.


PIN issuance and delivery

The standard includes requirements for keeping the PIN secret while transmitting it, after generation, from the issuer to the customer. These include: * The PIN is never available to the card issuing staff. * The PIN can only be displayed or printed for the customer in an appropriately secure manner. One method is a ''PIN mailer'', an envelope designed so that it can be printed without the PIN being visible (even at printing time) until the envelope is opened. A PIN mailer must also be constructed so that any prior opening will be obvious to the customer, who will then be aware that the PIN may have been disclosed. * The PIN shall never appear where it can be associated with a customer's account. For example, a PIN mailer must not include the account number, but only sufficient information for its physical delivery (e.g. name and address). The PIN and the associated card shall not be mailed together, nor at the same time.


PIN encryption

To protect the PIN during transmission from the PIN entry device to the verifier, the standard requires that the PIN be encrypted, and specifies several formats that may be used. In each case, the PIN is encoded into a ''PIN block'', which is then encrypted by an "approved algorithm", according to part 2 of the standard). The PIN block formats are:


=Format 0

= The PIN block is constructed by
XOR Exclusive or or exclusive disjunction is a logical operation that is true if and only if its arguments differ (one is true, the other is false). It is symbolized by the prefix operator J and by the infix operators XOR ( or ), EOR, EXOR, , ...
-ing two 64-bit fields: the ''plain text PIN field'' and the ''account number field'', both of which comprise 16 four-bit
nibble In computing, a nibble (occasionally nybble, nyble, or nybl to match the spelling of byte) is a four-bit aggregation, or half an octet. It is also known as half-byte or tetrade. In a networking or telecommunication context, the nibble is oft ...
s. The plain text PIN field is: * one nibble with the value of 0, which identifies this as a format 0 block * one nibble encoding the length ''N'' of the PIN * ''N'' nibbles, each encoding one PIN digit * 14−''N'' nibbles, each holding the " fill" value 15 (i.e. 11112) The account number field is: * four nibbles with the value of zero * 12 nibbles containing the right-most 12 digits of the
primary account number A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards. In some situatio ...
(PAN), excluding the
check digit A check digit is a form of redundancy check used for error detection on identification numbers, such as bank account numbers, which are used in an application where they will at least sometimes be input manually. It is analogous to a binary parity ...


=Format 1

= This format should be used where no PAN is available. The PIN block is constructed by concatenating the PIN with a transaction number thus: * one nibble with the value of 1, which identifies this as a format 1 block * one nibble encoding the length ''N'' of the PIN * ''N'' nibbles, each encoding one PIN digit * 14−''N'' nibbles encoding a unique value, which may be a transaction sequence number, time stamp or random number


=Format 2

= Format 2 is for local use with off-line systems only, e.g.
smart cards A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
. The PIN block is constructed by concatenating the PIN with a filler value thus: * one nibble with the value of 2, which identifies this as a format 2 block * one nibble encoding the length ''N'' of the PIN * ''N'' nibbles, each encoding one PIN digit * 14−''N'' nibbles, each holding the "fill" value 15 (i.e. 11112) (Except for the format value in the first nibble, this is identical to the plain text PIN field of format 0.)


=Format 3

= Format 3 is the same as format 0, except that the "fill" digits are random values from 10 to 15, and the first nibble (which identifies the block format) has the value 3.


=Extended PIN blocks

= Formats 0 to 3 are all suitable for use with the
Triple Data Encryption Algorithm In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Standa ...
, as they correspond to its 64-bit block size. However the standard allows for other encryption algorithms with larger block sizes, e.g. the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
has a block size of 128 bits. In such cases the PIN must be encoding into an ''extended PIN block'', the format of which is defined in a 2015 amendment to ISO 9564-1.


Part 2: Approved algorithms for PIN encipherment

ISO 9564-2:2014 specifies which encryption algorithms may be used for encrypting PINs. The approved algorithms are: *
Triple Data Encryption Algorithm In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The Data Encryption Standa ...
* RSA; *
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...


Part 3 (withdrawn)

ISO 9564-3 ''Part 3: Requirements for offline PIN handling in ATM and POS systems'', most recently published in 2003, was withdrawn in 2011 and its contents merged into part 1.


Part 4: Requirements for PIN handling in eCommerce for Payment Transactions

ISO 9564-4:2016ISO 9564-4:2016 ''Financial services — Personal Identification Number (PIN) management and security — Part 4: Requirements for PIN handling in eCommerce for Payment Transactions''
/ref> defines minimum security requirements and practices for the use of PINs and PIN entry devices in
electronic commerce E-commerce (electronic commerce) is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain manageme ...
.


Notes


References


External links


Complete list of PIN-blocks
with examples {{DEFAULTSORT:Iso 9564 #09564 Financial technology