What is the relationship between the EMV ODA, CA and issuer certificate during the transaction?
相关问题
- How to check that smart card is working on linux?
- How to make php application to require smart card
- accept visa and masterCard payment in java applica
- EMV CAPK Selection
- What's wrong with HCI applet downloading on sm
相关文章
- What is the relationship between the EMV ODA, CA a
- Reading Mifare 1k from a WinForm application
- authentication error for mifare card “6982:Securit
- Sign data using smart card's private key with
- Reading NFC Tag using JAVA Smart Card API not work
- Extended APDUs and T=0/1 communication protocols
- Using the ACS ACR1252U USB NFC Card reader in Linu
- Update: Personalization of Javacard Applet with Gl
ODA = Offline Data Authentication, ODA ( SDA/DDA/CDA) concept uses RSA cryptography therefore CA and issuer come into this place.
SDA - SDA ensures the authenticity of ICC data. After SDA it is sure that the data from the ICC is real and hasn't changed by anyone. But SDA doesn't assure the uniqueness of ICC data. You can see the diagram of SDA is like,
Here you can see two RSA Pair is using during SDA,
(1) - IssuerRSA
(2) - CA_RSA
this diagram is very descriptive and clear to understand the flow of SDA. Also you can check EMV BOOK 2 for more description about SDA. while DDA flow is like ,
here you can see 3 RSA Pair is using in DDA,
1 - IssuerRSA
2- CA_RSA
3 - ICC RSA ( new RSA key which is unique in all card, Each card generate this RSA pair during personalization of card so this RSA Pair will be different for each card)
SDA guarantees that data on cards is valid because we trust a high level certification authority which signs the data. But an attacker can record a card session and build for example a new virtuel card because same data is used here for all session.
But in DDA flow - we can say it is checking SDA + giving random data to card by Terminal to sign and here this part makes cloning of card impossible because each session use different random number so recording a card session will not work in next card session.
Hope it helps you to know about ODA and connection between CA and issuer. more can you read from SDA and DDA , Gemalto
Offline data authentication is the process to verify the cards authenticity. Terminals are loaded with CA Public key.
Issuer Public Key certificate. Issuer Public key used to validate the ICC Public Key certificate. ICC Public key used to verify the dynamic signature generated by the card using its ICC Private key.
Data Authentication is used for validating authenticity of an EMV payment card when the request for payment is received on POC. The EMV CA is used for generating EMV root certificates and issuing EMV Issuer certificates for banks that issue payment cards to their customers. Index of CA Public key, issuer certificate, and SDA signature with card holder data are sent to the POC, which can then get the CA public key from the POS storage, use the CA Public key to verify the Issuer RSA key in Issuer Certificate, and use the issuer RSA key to decrypt the SDA Signature and verify that what was signed is the same to the card data. In this process also EMV CA CRL, and EMV Issuer CRL is used for validating whether the certificates are not revoked.