Next Article in Journal
Lock-in Amplifier-Based Impedance Detection of Tissue Type Using a Monopolar Injection Needle
Previous Article in Journal
A Gaussian Process Model for Color Camera Characterization: Assessment in Outdoor Levantine Rock Art Scenes
Previous Article in Special Issue
Near Field Communication-based Agricultural Management Service Systems for Family Farms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication

1
Department of Information and Telecommunications Engineering, Ming-Chuan University, Taoyuan 33350, Taiwan
2
Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan 32023, Taiwan
*
Authors to whom correspondence should be addressed.
Sensors 2019, 19(21), 4611; https://doi.org/10.3390/s19214611
Submission received: 30 July 2019 / Revised: 16 October 2019 / Accepted: 18 October 2019 / Published: 23 October 2019
(This article belongs to the Special Issue Near-Field Communication (NFC) Sensors)

Abstract

:
In 2014, Yang proposed a method to enhance the current EMV credit card protocol (EPMAR). However, the protocol ignores the exceeding of a credit quota caused by multiple offline transactions, with the result that the amount spent can exceed the risk control scope. In this paper, we proposed an EMV-compatible offline mobile payment protocol with mutual authentication (EOPMA) to enhance EPMAR. In EOPMA, we use the reverse hash chain technique to guarantee the payment, which solves the problem of credit quotas getting exceeded because of multiple offline payments. During a transaction, in addition to payment for merchandise, an offline authorization certificate for the transaction is sent to the merchant. The merchant can verify the correctness of the transaction in real time. Our protocol is compatible with the EMV standard, which is applicable to the retail environment of numerous merchants and effectively, making EMV transactions more secure and reliable. We use numerical analysis to examine the security and performance of the protocols. We formally check the correctness of EOPMA by using the Gong–Needham–Yahalom logic.

1. Introduction

Credit cards have become crucial transaction tools. In 2002, the standards for EMV chip credit cards were set by international organizations such as Europay, MasterCard, and Visa [1,2]. Chip credit cards contain a microprocessor for computing power and a tamper-proof space for storing encryption keys and personal information. Scholars have investigated potential methods of improving the security of EMV protocol. For example, Ruiter and Poll applied the EMV protocol to their standardized modules [3] and used a third-party verification tool to formally analyze and validate the EMV protocol. Chen et al. proposed an improvement to the EMV key generation mechanism [4]. Murdoch and Anderson mentioned that the EMV protocol may come under threat and thus proposed improvements for mitigating threats to the EMV protocol [5]. Moreover, Alhothaily proposed a user-controlled multiple-condition verification method for improving security [6], solving the problem of a simple card verification method.
Contactless chip credit cards that employ near-field communication (NFC) sensing technology have gradually become mainstream [7,8,9,10,11]. MasterCard and Visa have created contactless credit cards, namely PayPass [12] and payWave [13], respectively. Because of the increasing popularity of NFC smartphones, Steffens [14], Cheng [15], and Noh et al. [16] proposed the integration of credit cards into mobile phones. Google, Microsoft, and Apple Inc. have also implemented a mobile phone virtual credit card mechanism [17,18,19,20] to replace conventional chip credit cards. Users only need an NFC smartphone with a virtual credit card to make a purchase, not needing to carry a physical chip card.
Numerous scholars have suggested security enhancements, analyzed smartphone NFC-based credit cards [21,22,23,24,25,26,27,28,29], and attempted to implement EMV credit cards on NFC smartphones to achieve convenience and security. Pasquet et al. proposed a security framework for detecting security issues with NFC smartphone credit cards [20] (e.g., transactions may be blocked or forged, privacy protection of secure element’s SIM card owner, protection of essential transaction data, transaction application security, hardware tamper-proof protection mechanism, and protection of personal data), and verified the detection processes using detection tools. Furthermore, Paillès et al. [22] proposed that verification messages be separately sent to both merchant and issuer, with the merchant not told the identity of consumer, but the consumer’s identity is verified by the issuer. Mainetti et al. suggested a peer-to-peer message exchange method when exchanging messages between NFC smartphones and merchants’ points of sale (POSs) [23]. Moreover, Urien and Piramuthu proposed that the secure element in an NFC phone be replaced with a cloud-based security element that provides security services to properly implement the EMV credit card protocol [24].
In addition, scholars have stated that NFC faces the following security threats [30,31,32,33]: (1) NFC is a wireless transfer method in which an electromagnetic wave is received by NFC devices nearby when a message is sent; malicious users can thus eavesdrop and obtain the message. (2) A malicious user can attempt to modify the message content. (3) A malicious user can disturb the NFC-transmitted message and corrupt it, resulting in an inability of the NFC card reader to interpret the message and thus denial of service. Finally, (4) a malicious user can determine the location of a particular NFC device because the identification number of each NFC device is unique. When an EMV transaction is conducted offline (e.g., when on an airplane), the merchant is unable to confirm the validity of a virtual credit card with the issuer in a timely manner as is the case in an online transaction; malicious users can thus commit fraud [34]. The offline risk control mechanism described in the EMV protocol cannot prevent a malicious user from committing fraud if the transaction amount is below a threshold [35]. Some studies have attempted to increase the security of offline transactions; for instance, Blaze et al. proposed risk control mechanisms such as adding a limit to the consumption amount and usage time to users’ certificates obtained from the issuer to reduce the offline payment risk [36]. Rivest and Shamir suggested that users first apply for a certificate that has an expiration date and credit quota from the issuer before making any transactions. A PayWord that does not exceed the credit quota is generated when an offline purchase is made [37]. In research on PayWord [37,38,39,40,41], approaches have mainly been suggested that can only be used for single-merchant restrictions, but some have also been proposed for multiple merchant restrictions [42,43,44].
Yang proposed EMV-based Payment with Mutual Authentication and Risk management (EPMAR), which is suitable for both offline and online transactions [45]. EPMAR adds mutual authentication to the original EMV protocol in a compatible manner to solve the problem that anyone can use a POS to read a card [46,47]; in EPMAR, all messages are encrypted using a shared key so that a malicious user cannot determine the content even if they hack into the transaction message [48,49]. However, the disadvantage of EPMAR is that the transaction amount exceeds the risk control range allowed by the credit card after multiple offline transactions.
In this paper, we propose EMV-based Offline Payment with Mutual Authentication (EOPMA), which is based on EPMAR and compatible with EMV mutual authentication in the NFC smartphone environment. In EOPMA, an offline transaction certificate and reverse hash chain are used to split and control transaction amounts for offline transactions, and the hash value obtained in each transaction clarifies the amount already spent. A counter installed in the NFC mobile device’s secure element is employed in the credit control method. The counter is forced to increase according to the amount spent in each transaction. Before an offline transaction is completed, the user must apply for an offline certificate that stipulates their credit quota and transaction authorization from the issuer; merchants can thus verify correctness of an EMV offline transaction.
Through a issuer’s endorsement value and the verification message given to each participating party (merchant and issuer), and the issuer can check the content of all transactions and verify the correctness of a message’s content (including the verification message sent by the user to the merchant), making transactions more secure by employing layers of checks.
EOPMA solves the exceeding of a credit quota caused by duplicate transactions in EPMAR that is beyond risk control to enhance the security of offline transactions. For the remainder of this paper, Section 2 introduces the EOPMA proposed in this study; Section 3 proves the security analysis of the protocol, and compares the performance with that proposed in other studies; Section 4 summarizes the methods proposed and the contributions.

2. EMV-Based Offline Payment with Mutual Authentication

An offline mutual authentication mobile payment protocol compatible with EMV is proposed in this study and is called EOPMA. EPMAR, the basis for EOPMA [45], increases the security of offline transactions and is applicable to NFC smartphones. The parties involved in EOPMA are the issuer, NFC mobile phone, acquirer, and merchant, as shown in Figure 1. Their roles are as follows:
  • Issuer: responsible for managing the application of credit cards and the issuance of offline transaction certificates. The issuer also communicates with the acquirer that deploys POS terminals through a secured financial network;
  • NFC mobile phone: used to store a virtual credit card in a secure element, and inductively transfers transaction data with the merchant’s POS. When a user wants to make an offline transaction, he must first apply for an offline transaction certificate from the issuer.
  • Merchant: deploys a POS to read the NFC mobile phone; transaction data received by the merchant are transmitted to the acquirer through a secure channel. Merchants can conduct online or offline transactions with the user.
  • Acquirer: receives the transaction data from the merchant and confirms the correctness of the transaction through the financial network. In offline transactions, the merchant cannot connect the acquirer to check if a credit card has been revoked.
The EOPMA process is divided into five phases: mutual authentication of the mobile phone, function selection, offline certificate application and split credit quota authorization, offline and online transactions, and payment request by merchant, as shown in Figure 2. The phases are explained as follows:
In phase 1 Mutual authentication, mutual authentication of the EMV card and POS is performed, and the exchanged certificates of both user and merchant are authenticated. The EMV card and POS verifies each other’s identity. Otherwise, the EMV card returns a failed acknowledgement and aborts the transaction.
Phase 2 is the function selection phase in which the merchant checks whether the user already has an offline certificate. In phase 2, two functions can be selected: applying offline certificate (go to phase 3), or go transactions (phase 4). Phases 1 and 2 are similar to those in EPMAR and the details are thus not discussed in this paper.
In phase 3, the user requests an offline transaction certificate and the amount required for the transaction from the issuer. In addition to an offline certificate, a credit quota calculated by the issuer is obtained from the application to effectively control the offline transaction amount. Moreover, crucial messages are protected by a secure element.
In phase 4, the transaction process begins. The EMV chip specifications define two types of the card authentication: online transaction and offline transaction. The processing steps for an EMV contact chip transaction are defined in Figure 4 of [2]. If the NFC mobile phone requests to go online, then the merchant’s terminal builds an online request to the issuer via the financial bank network for online card authentication. Otherwise, an offline transaction is performed if the user has a certificate; in an offline transaction, the merchant verifies the transaction message transferred by the user; if the merchant supports online transactions, the transaction message received by the merchant is transferred to the acquirer for verification. In phase 4, the mobile phone uses the credit quota parameters obtained during the application to calculate the amount spent in the current transaction and to generate a unique verification message for sending to the merchant and issuer. The merchant immediately knows the correct transaction amount, whereas the issuer is informed of the correct credit quota and the identity of the transaction merchant.
Phase 5 is the phase in which the merchant requests payment from the issuer. In phase 5, after the offline transaction has been completed, the merchant requests payment from the issuer via the acquirer by using the transaction verification data provided by the user, and the issuer uses the verification message sent by the user to the merchant via the acquirer to confirm whether the transaction is legitimate.

2.1. Generation of Offline Transaction Certificates

The method proposed in this study is compatible with the EMV standards [1]. The amount available for offline transaction is represented as two usable hash values that clearly indicate the amount used and amount usage range. Both merchants and issuers can verify the availability of this credit quota. The user must first apply for an offline transaction certificate with the issuer before making an offline transaction. During the transaction, the user shows the certificate to the merchant so that the merchant can submit the certificate to the issuer via the acquirer to verify the validity of the offline transaction.

2.1.1. (a) Generation of Secret Factors

The secret factors w 0 and s n used in the credit hash chain are not randomly generated but obtained using the method employed by PayFair [25] and proposed by Yen et al. Before the issuer generates w 0 and s n , it first generates the random numbers R w and R s and corresponding sequence numbers S N w and S N s . It then stores { S N w , R w } and { S N s , R s } in a table, as illustrated in Table 1.
The issuer uses the uniquely owned key K i s s to encrypt { S N w , R w } and { S N s , R s } into the w n and s 0 of the hash chain to form w n = E K i s s ( S N w , R w ) and s 0 = E K i s s ( S N s , R s ) . During issuer verification of the merchant’s payment request phase, the issuer receives S N w and S N s to identify R w and R s and uses K i s s to calculate the w n = E K i s s ( S N w , R w ) and s 0 = E K i s s ( S N s , R s ) to obtain the correct w n and s 0 for starting the verification process.

2.1.2. (b) Credit Quota Calculation Method

Assuming the available credit limitation is n, the issuer calculates the entire hash chain w 0 , w 1 , , w n by using the calculated w n :
w i = h ( w i + 1 ) , i = n 1 , n 2 , , 0 .

2.1.3. (c) Issuance of Offline Certificates and Credit Quota Calculation Method

When applying for an offline transaction, the issuer gives the user an offline certificate C e r t o f f and a credit quota L i m . In the offline certificate, the user is informed of their upper credit limit n, and the amount of the secret value w n , w 0 of the endorsed φ = E S K i s s ( w 0 ) , and S N w for verification are placed in the credit quota content. The user employs the same calculation method as the issuer, w i = h ( w i + 1 , for i = n 1 , n 2 , , 0 and uses w n to calculate the entire series of hash chains w 0 , w 1 , , w n . The user verifies w n through n depending on whether the calculation result of the hash function, w 0 , is the same to the w 0 endorsed by the issuer.

2.1.4. (d) Use of the Credit Quota

In each transaction, the amount spent is split from the credit quota to pay the merchant. The splitting method is to sequentially give the hash value from the hash chain from w 0 , , w b , , w b + c , , w n ; when it reaches w n , the maximum credit quota has been reached. To make further purchases, the user must reapply a new quota to the issuer.
The hash value generated by w i = h ( w i + 1 ) is used to represent the currently spent amount, and the interval between w b and w b + c is used to perform c calculations to obtain the amount used in the transaction. As illustrated in Figure 3, assuming that the offline credit quota applied is n and the amount spent in the first transaction is b, the user provides w 0 and w b . In the second transaction, the amount spent is c, and the user provides a continued amount of use of w b and w b + c . Finally, as shown in Figure 3, the credit quota is reached after multiple transactions when the user gives the merchant w k and w n , at which point the user must reapply for an offline transaction certificate to the issuer.
This protocol employs the characteristics of the reverse hash chain, with which the merchant obtains w i = h ( w i + 1 ) ; the merchant cannot calculate the previous hash value w i + 1 and thus cannot forge any amount unequal to that the user has authorized to the merchant. The protocol applies to a retail environment in which many merchants may be involved. When the user makes their first purchase, the merchant is given a quota between w b and w b , whereas, when the second purchase is made, the second merchant will be given the limit of w b and w b + c . This method is used to achieve an offline transaction mechanism that can be used for multiple merchants.

2.1.5. (e) Credit Quota Verification

As illustrated in Figure 3, the amount spent in the first transaction is b, and the merchant obtains w 0 and w b from the user. The merchant can judge the correctness of w b by calculating whether w b after b hash function calculations is equal to w 0 . The amount spent in the second purchase is c, and the merchant obtains the amount of w b and w b + c that the user continues to use; then, w b + c is used to calculate the hash function c times to determine whether it is equal to w b .
In a transaction, two transaction verification messages, μ and β , are sent. μ is the verification message provided to the merchant with which the following verification is conducted:
  • w b and w b + c are used to calculate the correctness;
  • the issuer’s public key is employed to decrypt φ to obtain w 0 , and it is checked whether w b can be calculated back to w 0 to verify that the obtained hash value is correct;
  • the merchant checks that the forced addition to c o u n t e r by the user is less than the applied amount n;
  • the merchant checks that I D M is the merchant’s own ID.
The variable β is a verification message provided to the issuer to perform symmetric encryption by using the shared key K β . The issuer verifies the contents of β by:
  • the issuer verifies the merchant identity s v ;
  • the issuer checks whether I D M 0 is in the merchant list M;
  • the issuer obtains the serial number of the secret factor of the hash chains S N w and S N s and checks the corresponding hash value secret factors w n and s 0 ;
  • the issuer checks that the derived R l i m is the same offline certificate and credit quota that was supplied by the user.

2.2. Merchant’s Identity

When users purchase from multiple merchants, the merchants must be unable to deny the purchases. The identity of each merchant is calculated using each hash value in the hash chain, which is as follows:
s i + 1 = h ( s i ) , i = 0 , 1 , , n .
s 0 is a hash function secret factor representing the identity of a merchant. In the first transaction, the mobile phone calculates s 1 to represent the merchant participating in the transaction. Similarly, in the second transaction, s 2 is calculated to represent the participating merchant. The secret factor of this hash chain s 0 is only shared between the issuer and mobile phone; the merchant is unaware which hash value it belongs to. Finally, the s n generated after the nth transaction (first item of the reverse hash chain) is stored in the phone’s secure element, and the user cannot modify the hash value of the representative merchant.

2.3. Compatibility with the EMV Protocol

The method proposed in this study is based on EPMAR, in which an unused field (EXTERNAL AUTHENTICATION command) of the EMV [1] command parameter is used to add new messages without changing the order of the original protocol. In addition, the unused option field (reserved for future use [RFU] of GENERATE AC) in the EMV message transfer is used to transfer the parameters and certificates required for authentication to improve security of offline transactions.
To distinguish parts of messages, blue font is used to indicate the newly added message and execution calculation by referring to EPMAR as the benchmark, and a green box indicates that the newly added message uses a field that is not used by EMV or has been reserved in order to be compatible with the EMV protocol.
Regarding the items held by mobile phones, merchants, and issuers during initialization, in addition to what is already employed in EPMAR (e.g., credit card data D a t a e m v , credit card private key S K e m v , communication key T K , merchant’s certificate C e r t m a c q , shared key K e n c e m v , message authentication code K m a c e m v , and merchant public key P K m ), mobile phones and merchants hold a public key P K i s s of the issuer, which can be used to decrypt an encrypted message after endorsement by the issuer. The issuer adds (1) the issuer’s own key, K i s s , which is used to generate a credit quota and the secret value of the merchant’s hash function; (2) the issuer’s private key, S K i s s , which is employed to endorse the credit quota; and (3) the credit card’s public key, P K e m v , which shares the essential parameters needed for the offline transaction stored in the secure element of the credit card.

2.4. Phase 3: Offline Certificate Application and Split Credit Quota Authorization

2.4.1. Phase 3 Process Diagram

Figure 4 presents a flowchart of offline certificate application and split credit quota authorization processes. In steps 1 and 2, the merchant requests an offline certificate from the user’s mobile phone, and the mobile phone applies to the issuer if it does not have an offline certificate.
Step 1: The merchant requests the user’s NFC phone to present its offline certificate.
Step 2: If the phone does not have an offline certificate,
  • (2a-1) the phone applies to the issuer for a certificate and the split credit quota authorization required for transactions.
  • (2a-2) the issuer generates the offline certificate, transaction authorization, and credit quota required to split the certificate. The certificate is stored in the secure element of the phone upon receipt.
If the phone has an offline certificate,
  • (2b) the phone sends a message containing the offline certificate to the merchant.

2.4.2. Phase 3 Protocol

To make the protocol concise, the commands that a merchant sends to the credit card to obtain data types are omitted. The transmitted message is indicated by a solid arrow above, and the action performed after receiving the message is denoted by the solid box. A communication key, T K , is used to encrypt and protect the transaction between the phone and merchant’s POS. Figure 5 presents the protocol for offline certificate application.
  • Message 1
    When the user’s phone receives a GENERATE AC command [1] containing an offline certificate request cryptogram (OCRC) [45], the phone first decrypts E ( D a t a c d o l 1 ) to retrieve D a t a c d o l 1 by using the communication key T K . The data transferred by the merchant, E ( D a t a c d o l 1 ) , serial number of the transaction, A T C [1], and a random number obtained in mutual authentication, R m [45], are used to generate a message authentication code with the hash function by using the shared key, K m a c e m v , with the issuer:
    A C = M A C K m a c e m v ( D a t a c d o l 1 , A T C , R m ) .
  • Message 2
    The phone encrypts the O C R C , A T C , and A C that were originally to be transmitted according to the protocol using T K and sends them back to the merchant to begin the offline certificate application phase.
  • Message 3
    After receiving the message E T K ( O C R C , A T C , A C ) from the phone, the merchant decrypts O C R C , A T C , and A C by using T K . Subsequently, in addition to sending the decrypted data D a t a c d o l 1 and the R m generated in mutual authentication to the issuer, the merchant informs the issuer of the longest offline duration to be used, e n d _ t i m e [45], so that the issuer can set the expiration time of the offline certificate according to the offline transaction environment.
  • Message 4
    Once the issuer receives the O C R C request message for offline certificate application, it uses the shared key K m a c e m v , D a t a c d o l 1 , A T C , and R m in the message to calculate M A C K m a c e m v ( D a t a c d o l 1 , A T C , R m ) and determine whether the A C code in the message sent by the merchant is correct. If the message is incorrect, the authorization response code ( A R C ) is set to fail. Otherwise, the A R C is set to success, and the issuer starts to generate the parameters and transaction verification message required for issuance of the offline transaction certificate and credit control:
    • Randomly generated numbers R w and R s are used to create the corresponding serial numbers S N w and S N s , and { S N w , R w } and { S N s , R s } are stored in S T a b l e .
    • The K i s s of the issuer is employed to encrypt the random and serial numbers to generate secret factors representing the credit quota w n and offline transaction merchant s 0 :
      w n = E K i s s ( S N w , R w ) ,
      s 0 = E K i s s ( S N s , R s ) .
    • The hash values of w n and s 0 are calculated and placed into the reverse hash chain set W and forward hash chain set S:
      W = { w i | w i = h ( w i + 1 ) , 0 i n 1 } ,
      S = { s i | s i = h ( s i 1 ) , 0 < i t } .
    • All authorized merchant identities I D M i are placed in the authorized merchant set M.
    • A K β is generated that enables the issuer to authenticate the transaction message.
    • A b is generated that represents the current user’s amount spent. Because the amount has not been used at the application phase, b = 0 .
    • The issuer’s S K i s s is used to perform asymmetric encryption φ = E S K i s s ( w 0 ) on the last item w 0 of the credit quota hash chain for issuer endorsement. During the transaction, the merchant confirms the correctness of w 0 and calculates and verifies that the amount received is correct.
    • Asymmetric encryption is performed using the credit card’s public key P K e m v , inserting the (a) shared key K β of the user and issuer; (b) secret factor w n of the limit hash chain; (c) serial number S N w of w n ; (d) s 0 , which represents the secret factor of the merchant’s hash chain; (e) serial number S N s of s 0 ; (f) amount to be spent b; (g) φ after w 0 has been endorsed by the issuer; and (h) apart from necessary amount data, a random number R l i m , which prevents the amount spent message from being resent:
      L i m = E P K e m v ( K β , w n , S N w , s 0 , S N s , b , φ , R l i m ) .
    • According to EMV standards, the e n d _ t i m e sent by the merchant, and the user’s credit assessment, the issuer generates C e r t o f f , an X.509 certificate [50]. This certificate includes the issuer ( I s s u e r ), user’s credit card account ( P A N ), offline certificate expiration time ( E T ), consumption upper limit (n), and all authorized merchant identities (M).
    Finally, the issuer uses K m a c e m v to generate a message authentication code M A C K m a c ( A C ARC) by using the mutually exclusive results between A R C and A C . Subsequently, this message authentication code, A R C , the E ( K e n c e m v ( C e r t o f f ) encrypted by the phone’s K e n c e m v , and L i m are sent to the merchant.
  • Message 5
    If the merchant receives a reply from the issuer that the A R C fails, the offline certificate application process is terminated. However, a successful A R C indicates that the issuer agrees to send an offline certificate. The merchant uses the EXTERNAL AUTHENTICATION command marked in the unused parameter field [1] to transfer the offline certificate to the user’s mobile phone [45]. In addition, L i m is placed in this unused parameter field.
    Decryption and verification are performed after the phone has received E T K ( M A C K m a c e m v ( A C ARC ) , ARC , L i m ) and E ( K e n c e m v ( C e r t o f f ) :
    • Decryption is performed using T K , and the A R C received, A C calculated at the beginning of the protocol, and K m a c e m v are used to calculate the message authentication code M A C K m a c e m v ( A C ARC) to confirm that it is similar to the code received.
    • K e n c e m v is employed to decrypt the offline certificate C e r t o f f and inspect its source. The phone sets the inspection result A R C to fail for a failed message authentication code and offline certificate verification.
    • If the message received is verified to match the correct C e r t o f f , the certificate is placed in the D a t a e m v list, making D a t a e m v = D a t a e m v C e r t o f f .
    • The S K e m v of the credit card is used to decrypt the asymmetric encryption of Lim to obtain K β , w n , S N w , s 0 , S N s , b, φ , and R l i m and store them in the secure element for protection to prevent users from arbitrarily modifying the essential parameters and data of their offline transactions. Once the phone receives it, the Lim is sent directly to the secure element for decryption. The phone plays a mediating role between the merchant and secure element.
    • The issuer’s public key is employed to decrypt the asymmetric encrypted φ to obtain the w 0 generated by the issuer, and whether w 0 is equal to the w n obtained by decrypting L i m after n hash function calculations is determined. If w 0 h n ( w n ) , the A R C fails; otherwise, the A R C is success, with c o u n t e r = 0 . The forced added counter in the secure element adds up the amount of each purchase to the counter until the upper limit n is reached; reapplication is then required to continue making offline transactions.
  • Message 6
    Finally, the phone returns the A R C to the merchant. If the A R C fails, the merchant must reapply for a certificate. Otherwise, the user’s phone saves the offline certificate, and the phone does not need to reapply for an offline certificate in the next transaction if the message received by the merchant contains D a t a e m v , which indicates that offline transaction can commence immediately.

2.5. Phase 4: Offline and Online Transactions

Figure 6 presents a flowchart of offline transactions. In steps 3 and 4, the merchant provides relevant data to the user regarding purchased merchandise, and the user provides their certificate, payment, and verification information to the merchant upon confirmation.
In step 3, the user selects the merchandise to be purchased, and the phone displays the merchandise information and price for the user to confirm. In step 4, after the user has given their confirmation, the phone makes the payment and provides the merchant with the offline certificate and credit quota.
In phase 4, the merchant transfers an offline/online transaction request ( R e q ) and a GERNATE AC command (information required for transactions in the EMV protocol), encrypted by T K , to the mobile phone, as illustrated in Figure 7. If R e q = A R Q C , an online transaction is performed between the merchant and mobile phone; if R e q = T C , an offline transaction is performed.
  • Message 7
    Once the phone receives the GENERATE AC command with parameter R e q , T K is used to decrypt the transaction data to obtain D a t a c d o l 1 , and the user confirms that the transaction amount in D a t a c d o l 1 is correct. The phone then executes the following three steps in accordance with the EMV payment requirements:
    -
    A message authentication code is generated from the D a t a c d o l 1 , A T C , and r m using the issuer’s K m a c e m v . A C 1 = M A C K m a c e m v ( D a t a c d o l 1 , A T C , R m ) .
    -
    R p , D a t a c d o l 1 , A T C , the R e q of A C 1 , A C 1 , and the r m for generating A C 1 are calculated.
    -
    Encryption is performed using the EMV credit card’s S K e m v to generate the signed dynamic application data (SDAD) from R p , R e q , A C 1 , and the hash function h ( R p , R e q , A C 1 , R m , D a t a c d o l 1 , A T C ) generated in the previous step.
    The data stored in the secure element during the application phase are retrieved for verification and calculation, and transaction verification and payment messages are generated:
    • The I D M g sent by the merchant must be present in the authorized merchant list M of C e r t o f f ; if it is not, the transaction is canceled immediately.
    • The amount spent b is employed to calculate the used hash value w b = h n b ( w n ) . Moreover, the transaction amount c is used to calculate the paid hash value w b + c = h c ( w b ) . The amount spent is a reverse hash chain, and the hash is a one-way irreversible function; thus, the actual method for calculating the hash value is as follows:
      w b + c = h n ( b + c ) ( w n ) .
    • The merchant code s v = h ( s u ) is calculated. In the first purchase, u = 0 and v = 1 . Each transaction generates a hash value s i representing the merchant, and the shared key is used for encryption so that the merchant is unaware of s i ; nonetheless, it does represent the merchant participating in the transaction.
    • The amount c is spent in the transaction; thus, the amount spent becomes b = b + c .
    • The current purchase amount c is added to c o u n t e r , such that c o u n t e r = c o u n t e r + c .
    • A verification message β is generated for the issuer, and the offline transaction authentication key K β , which was obtained by the secure element during the application is used to represent the merchant’s identity hash value s v , serial number S N w of w n , serial number S N s of s 0 , and R l i m placed in L i m during the application phase; these are symmetrically encrypted to become β = E K β ( s v , S N w , S N s , R l i m ) .
    • A verification message μ is generated for the merchant, and the S K e m v of the credit card is employed to asymmetrically encrypt the issuer verification message β , amount after issuer endorsement φ , hash value of the amount spent w b , hash value of the payment amount w b + c , current amount spent c, offline transaction amount counter, and merchant’s identity I D M g into μ = E S K e m v ( β , φ , w b , w b + c , c , c o u n t e r , I D M g ) .
  • Message 8
    The mobile phone encrypts R e q , A T C , S D A D , μ , and β , which are returned to the merchant through the use of T K . The newly added message content is placed in the RFU of GENERATE AC for transfer to achieve an EMV-compatible protocol.
    The merchant receives the returned message E T K ( R e q , A T C , S D A D , μ , β ) from the mobile phone and performs two decryption and six verification actions:
    -
    T K is used to decrypt E T K ( R e q , A T C , S D A D , μ , β ) and extract R e q , A T C , S D A D , μ , and β .
    -
    P K e m v is employed to decrypt μ and obtain β , φ , w b , w b + c , c , c o u n t e r , and I D M g ’, and the issuer’s public key is used to decrypt φ to obtain w 0 :
    • The S D A D is decrypted using P K e m v , and the hash function h ( R p , R e q , A C 1 , R m , D a t a c d o l 1 , A T C ) is verified.
    • I D M g ’ in μ is equal to I D M g .
    • Whether current time meets the E T limited by the C e r t o f f is checked.
    • Whether the counter limit has not exceeded the offline transaction amount n set in the offline certificate is checked.
    • The correctness of w b is calculated. Using w b = h i ( w 0 ) , where 0 i n , it is determined whether w b and w 0 are in the same hash chain. Whether w b + c is equal to w b after c hash function calculations is determined, and the calculation method is h c ( w b + c ) = w b .
The transaction is terminated immediately if any verification fails. Finally, receipt of R e q = T C indicates that the transaction is an offline transaction, and the merchant requests payment from the issuer to complete the transaction. However, if R e q = A R Q C is received, the merchant transfers data to the issuer to begin an online transaction. The transfer content of the online transaction begins from Message 3.

2.6. Phase 5: Payment Request by the Merchant

Figure 8 presents the merchant payment request diagram. In steps 5 and 6, the merchant transfers the payment information and verification message to the issuer to verify the correctness of the transaction. If the information is correct, the issuer sends the amount corresponding to the user’s purchase to the merchant.
  • Step 5: the merchant sends the self-verified message, issuer-verified message, and payment information to the issuer to request verification of the transaction’s correctness.
  • Step 6: if the transaction is verified, the merchant can request payment from the issuer.
Once the offline transaction is complete, the merchant sends the payment message received to the issuer. As illustrated in Figure 9, in addition to the transaction message of a payment request, an additional verification required by the issuer (in the method proposed in this study) is added.
The merchant sends the verification messages μ and β to the issuer. The issuer decrypts the messages using K β and P K e m v , respectively, to obtain { s v , S N w , S N s , R l i m } = D K β ( β ) and { β , φ , w b , w b + c , c , c o u n t e r , I D M g } = D P K e m v ( μ ) .
Whether S N w and S N s ′ in β exist in S T a b l e is checked. If they do, sequence numbers S N w and S N s are used to obtain the random numbers R w and R s from the table. Subsequently, { S N w , R w } , { S N s , R s } , and the issuer’s K i s s are employed to perform encryption for calculating w n = E K i s s ( S N w , R w ) and s 0 = E K i s s ( S N s , R s ) to obtain the w n and s 0 applied by the user. After obtaining w n and s 0 , the issuer makes checks and verifications to determine whether the transaction amount should be issued to the merchant:
  • It is verified that w b and w b + c are in the W hash value set generated during the application phase and the merchant representative hash value s v is in the S hash value set.
  • Whether I D M g in μ is present in the list of authorized merchants of the offline certificate C e r t o f f is determined.
  • The preposition w b = h i ( w 0 ) , where 0 i n , is considered to determine whether w b and w 0 are in the same hash chain and thus confirm their correctness. Whether w b + c equals w b after c hash function operations is determined, and its calculation method is h c ( w b + c ) = w b .
  • Whether c o u n t e r exceeds the limit n is checked.
  • It is confirmed that the R l i m in β is equal to the R l i m placed in L i m during the application phase.
If the aforementioned verification fails and the comparison result does not conform to the issuer, the transaction is rejected and reviewed. If the verification is successful, the issuer pays the amount to the merchant.

3. Security Analysis and Performance Evaluation

The security of the method proposed in this study and the performance are analyzed in this chapter.

3.1. Security Analysis

  • Verifiability:
    • In phase 4, the merchant can immediately verify the verification message of the offline transaction.
    • In phase 5, the issuer obtains transaction verification messages (for the merchant and issuer) from the merchant and verifies all the information obtained to ensure the correctness of the transaction.
  • Counterfeiting prevention:
    • In phase 3 (2a-2), the issuer provides the user and merchant with the encrypted hash value of the final item of the user’s credit quota chain w n so that they can verify the amount of the hash value (as shown in Figure 4). Attackers cannot encrypt the cipher text without the issuer’s private key.
    • In message 7 of phase 4, the amount spent b information given to the merchant is protecvalue w b = h n b ( w n ) by the user is asymmetrically encrypted using the credit card private key S K e m v : μ = E S K e m v ( β , φ , w b , w b + c , c , c o u n t e r , I D M g ) , and the merchant requests payment from the issuer after confirmation. Incorrect amount information generated by the user is immediately detected by the merchant. Similarly, the merchant cannot falsify the information given by the user to request a higher amount from the issuer.
  • Tampering prevention:
    • In the application phase, the offline transaction certificate and credit quota limit information L i m = E P K e m v ( K β , w n , S N w , s 0 , S N s , b , φ , R l i m ) are encrypted using the virtual credit card’s public key P K e m v and the key K β shared between the user and issuer, enabling the issuer to protect the message content. In addition to the credit quota hash chain’s secret factor s 0 , the credit quota message contains cipher text encrypted using the issuer’s private key.
    • If the secret factor s 0 is not calculated by the original issuer, different hash values obtained during the verification will cause failure of the verification.
    • The verification message given to the merchant S D A D in message 8 of phase 4 is encrypted using the virtual credit card’s private key S K e m v , which is stored in the secure element. Even if malicious software is installed on the user’s mobile phone, the content encrypted by the secure element is not easily modified.
  • Replay attack prevention:
    • In the application phase, the issuer places a random number w n = E K i s s ( S N w , R w ) in the credit quota message and passes it to the user. The user places the random number in the issuer verification message (as shown in Figure 9 and passes it to the merchant during a transaction. The merchant sends this message to the issuer during their payment request. The issuer then checks whether the random number is the same as that given by the issuer to the user during application and whether the corresponding amount is the amount originally given as the hash value.
  • Nonrepudiation:
    • In phase 4, in addition to having a transaction message, the user has a verification message (to be given to the merchant) that is encrypted using the virtual credit card’s private key S K e m v to generate the signed dynamic application data (SDAD) from R p , R e q , A C 1 , which ensure that the message is sent by the user. The user cannot deny that they have created this message.
    • The issuer verification message μ = E S K e m v ( β , φ , w b , w b + c , c , c o u n t e r , I D M g ) also contains two corresponding hash values ( w b and w b + c ) for the transaction that the merchant is not informed of, indicating that the credit quota is for the use of a certain merchant. If the merchant subsequently denies the transaction, the issuer can identify the corresponding merchant during verification.
  • Duplicate payment prevention:
    • The user cannot cheat the merchant because a c o u n t e r is stored in the secure element of the mobile phone and is forced to increase upon every transaction. The value of c o u n t e r must be smaller than the transaction usage amount requested by the user. If the user repeatedly uses the amount of the hash value, the counter is still forcibly added to; thus, the amount spent must be lower than the applied amount (e.g., a failed transaction may waste the usable amount because the counter has already been forcibly added to when the user sends out a credit quota limit hash value), and the amount does not expand because of a duplicate payment. If the merchant want to duplicate the payment (as shown in Figure 8), it sends μ and β to the issuer. The issuer will decrypt the message and detect double-spending by using the w b and w b + c are in the W hash value set generated during the application phase.
Table 2 shows the security comparison between our protocol EOPMA, EPMAR [45], and the original EMV standards [1]. We also compare our protocol with Al-Tamimi [28] and Madhoun [29] works. EOPMA, EPMAR and Modhoun’s scheme perform mutual authentication with the merchant. Both of them can detect a malicious phone and a malicious merchant. The original EMV standards (CDA, DDA and SDA) only authenticate with the phone, which causes an MITM attack to possibly occur. In addition, in an EMV transaction, the data between a reader and a card are transmitted in plaintext.
In Al-Tamimi’s scheme, it adds a Mobile Network Operator (MNO) layer as a trust third party to perform mutual authentication between the NFC phone and the merchant. However, it requires extra communication channel, which is not fully EMV-compatible.

3.2. GNY Logic Proof

In this section, we use the Gong–Needham–Yahalom (GNY) logic [51] to prove the security of our proposed protocol. The GNY logic is used for the analysis of cryptographic protocols in a formal way, which can be easily applied and gives a quick insight in the working of a protocol. Our analysis includes four parts: the notation of the GNY proof (Table 3), initial assumptions (Table 4), goals of proposed protocol (Table 5), and the proving process (Table 6).

3.3. Performance Analysis

In the current EMV standard, the asymmetric encryption uses RSA 1024 bits, we also add RSA 2048 bits as the object of analysis. In symmetric encryption, we chose AES-128 as the benchmark for our symmetric encryption. In order to compare with the original EMV standards, we chose the same experimental environment as EPMAR; use two E975 LG Optimus G mobile phones at Taiwan to negotiate the consumer side and the merchant side, and use the Android API level 16 library to implement EOPMA. The transmission rate between the phone and the reader is 858 kbit/s, according to ISO 14443 standard. Table 7 lists the operation time of cryptography functions of the LG mobile phone. Due to the restriction of EMV standards, an EMV transaction should take less than 500 ms, we choose RSA-1024 in our protocol evaluation.
Next, we compare the extra computational loads with EPMAR. We assume the computation capabilities of the issuer are better than the mobile phone and the merchant’s POS. Table 8 shows the extra operation time of EOPMA, comparing to EPMAR. We use the symbol T H , T A , T R S A E , T R S A D , T r as HMAC, AES, RSA encryption, RSA decryption and random number generation, respectively. In phase 1 and phase 2, the EOPMA operations are the same as EPMAR. In phase 3, the issuer requires extra six random numbers’ generation, plus two hash chains (W and S) calculations. The W hash chain is for the credit quota generation and the S hash chain is used to represent the count of merchants. The phone needs an AES decryption and n HMAC-128 to calculate the hash chain w n ( n H ).
In phase 4, the phone only needs one AES encryption and one RSA encryption. The merchant requires one AES decryption, one RSA decryption and up to (c-b) hash operations. In phase 5, the merchant only forwards the payment information to the issuer; all the verifications are done in the issuer.
In the experiment, we choose n = 1 . . 100 , for the maximum of 100 offline transactions, and the maximum offline transactions per merchant, ( c b ) = 10 . The result is shown in Figure 10. The extra spent time of the phone is less than 23 ms. The issuer requires 29.74 ms for 100 transactions. However, the computing power of a server far exceeds that of a mobile phone. The issuer’s calculation time will be smaller than the experiment.

4. Conclusions

In this paper, we proposed an offline mobile payment protocol named EOPMA that is compatible with EMV, provides mutual authentication, and can solve the problems of credit quota exceeding in EPMAR and duplicate payments in PayWord. In EOPMA, an offline transaction is halted when the offline credit quota reaches the amount specified by the user, and the user must then reapply to the issuer to make further purchases. Through the proposed offline certificate and credit control, both the issuer and merchant can clearly verify the content of transaction information and the credit quota given by users, protecting them from losses incurred. Using EOPMA, the amount spent will never exceed the credit quota imposed by the issuer to ensure credit control and solve the double-spending problem.
We implemented EOPMA on an NFC phone and compared the performance with other schemes. EOPMA implemented EMV’s unused and reserved commands to add a new method that is compatible with the existing EMV protocol. Our protocol resists the security threats in the EMV standards, such as man-in-the-middle attacks, replay attacks, and clone attacks. The cryptographic protocol analysis logic of Gong, Needham and Yahalom (GNY) is used to prove the correctness of EPMAR.

Author Contributions

J.-N.L. and M.-H.Y.: conceived and designed the protocols; M.-H.Y.: formal analysis, J.-N.L. and M.-H.Y.: wrote the paper; J.-N.L.: review and editing.

Funding

This research was funded by the Taiwan Information Security Center (TWISC) and the Ministry of Science and Technology (MOST) under Grant Nos. MOST 108-2218-E-011-021, MOST 108-2221-E-033- 016, and MOST 107-2221-E-130-001.

Acknowledgments

We are grateful for the assistance of the reviewers and editors.

Conflicts of Interest

The authors declare no conflict of interest.

Notations

SymbolsDefinitions
C e r t t a r g e t p u b l i s h e r Publisher signs the certificate issued to the target, and the certificate contains a public key corresponding to the target’s private key.
C e r t o f f Required certificate for offline transactions.
P K t a r g e t Target’s public key.
S K t a r g e t Target’s private key.
K e n c e m v A symmetric encryption key shared between the credit card and issuer.
K m a c e m v A symmetric key shared between the credit card and issuer for calculating the message authentication code.
K β A symmetric key shared between the credit card and issuer for encrypting the offline transaction certificate message provided to the issuer.
T K A communication key for the mobile phone and merchant.
K i s s A key owned by the issuer for encryption of specific serial numbers and random numbers to generate secret values for the hash function chain.
E k e y ( M ) Encryption of message M by using a symmetric or asymmetric key.
D k e y ( M ) Decryption of message M by using a symmetric or asymmetric key.
M A C K m a c e m v ( M ) In the EMV protocol, a symmetric authentication function and a key K m a c e m v are used to calculate the message authentication code function of message M.
h ( M ) The hash function and key are employed to calculate the message authentication code function of message M.
nThe maximum credit quota during an offline transaction, which also represents the number of hash functions that can be calculated by the hash function chain of the credit quota.
tMaximum number of offline transactions.
mNumber of merchants authorized for offline transactions.
w n The first item of the hash function chain, which can perform nth hash function calculations for the limit of offline transactions.
w 0 The last item in the hash function chain for the credit quota for offline transactions.
s 0 The first item of the hash function chain, which is used to represent the secret factor of the merchant participating in the offline transaction.
s n The nth item of the hash function chain, which is used to represent the merchant participating in the offline transaction, indicating the merchant corresponding to the nth offline transaction.
i , i The plaintext i obtained after decryption using the key.
S T a b l e The table in which the issuer places the w n and s 0 elements.
S N i The serial number corresponding to i.
R i The random number used for i.
R l i m The random number attached to the credit quota issuance.
L i m The required content for offline transaction amount management and restrictions.
WA set of hash values for all amounts.
SA set of hash values for all corresponding merchants.
MA set of all merchants authorized to complete offline transactions.
I D M The identification name of merchant i.
c o u n t e r Offline transaction amount counter.
φ The credit quota issued by the issuer.
lThe number of calculations of the hash function corresponding to this consumption amount.
e n d t i m e The longest offline transaction duration notified by merchants.
P A N Primary account number, which is the user’s credit card account number.
E T Expiry time, which is the effective time taken to complete the offline transaction.

References

  1. EMVCo: EMV—Integrated Circuit Card Specifications for Payment System, Version 4.3 ed.; EMVCo, LLC: Foster City, CA, USA, 2011.
  2. EMVCo: A Guide to EMV Chip Technology, Version 2.0 ed.; EMVCo, LLC: Foster City, CA, USA, 2014.
  3. De Ruiter, J.; Poll, E. Formal Analysis of the EMV Protocol Suite. In Proceedings of the 2011 international conference on Theory of Security and Applications (TOSCA 2011), Saarbrücken, Germany, 31 March–1 April 2011; Volume 6693, pp. 13–129. [Google Scholar]
  4. Chen, C.; Tang, S.; Mitchell, C.J. Building General-Purpose Security Services on EMV Payment Cards. In Proceedings of the 8th International Conference on Security and Privacy in Communication Networks, Padua, Italy, 3–5 September 2012. [Google Scholar]
  5. Murdoch, S.J.; Anderson, R. Security Protocols and Evidence: Where Many Payment Systems Fail. In Proceedings of the 8th International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, 7 March 2014. [Google Scholar]
  6. Alhothaily, A.; Alrawais, A.; Cheng, X.; Bie, R. Towards More Secure Cardholder Verification in Payment System. In Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications (WASA), Harbin, China, 23–25 June 2014; pp. 356–367. [Google Scholar]
  7. ECMA INTERNATIONAL: Standard ECMA-340, Near Field Communication Interface and Protocol (NFCIP-1), 3rd ed.; ECMA International: Geneve, Switzerland, 2013.
  8. ECMA INTERNATIONAL: Standard ECMA-352, Standard ECMA-340, Near Field Communication Interface and Protocol -2 (NFCIP-2), 3rd ed.; ECMA International: Geneve, Switzerland, 2013.
  9. Information Technology—Telecommunications and Information Exchange between Systems—Near Field Communication Interface and Protocol-1 (NFCIP-1); ISO/IEC 18092:2013; International Organization for Standardization: Geneva, Switzerland, 2013.
  10. Information Technology—Telecommunications and Information Exchange Between Systems—Near Field Communication Interface and Protocol-2 (NFCIP-2); ISO/IEC 21481:2012; International Organization for Standardization: Geneva, Switzerland, 2012.
  11. Identification Cards—Contactless Integrated Circuit Cards—Proximity Cards—Part 1–Part 4; ISO/IEC 14443 International Organization for Standardization: Geneva, Switzerland, 2008.
  12. Giese, D.; Liu, K.; Sun, M.; Syed, T.; Zhang, L. Security Analysis of Near-Field Communication (NFC) Payments. arXiv 2019, arXiv:1904.10623. [Google Scholar]
  13. Visa payWave—Visa Contactless Payment Specification (VCPS) Version 2.1; Visa Inc.: Foster City, CA, USA, 2009.
  14. Steffens, E.-J.; Nennker, A.; Ren, Z.; Yin, M.; Schneider, L. The SIM-based Mobile Wallet. In Proceedings of the 13th International Conference on Intelligence in Next, Generation Networks (ICIN), Bordeaux, France, 26–29 October 2009; pp. 1–6. [Google Scholar]
  15. Cheng, H.C.; Chen, J.W.; Chi, T.Y.; Chen, P.H. A Generic Model for NFC-based Mobile Commerce. In Proceedings of the 11th International Conference on Advanced Communication Technology, Gangwon-Do, Korea, 15–18 Febraury 2009; pp. 2009–2014. [Google Scholar]
  16. Noh, S.K.; Choi, D.Y.; Kim, H.G.; Kim, D.K.; Seo, J.H.; Kim, J.W.; Cha, B.R. Proposed of Micropayment and Credit Card Model using NFC Technology in Mobile Environment. Int. J. Multimedia Ubiquitous Eng. 2013, 8, 295–305. [Google Scholar]
  17. Google Corp. Google Wallet. Available online: http://www.google.com/wallet/ (accessed on 22 October 2019).
  18. Microsoft Corp. Trusted Platform Module (TPM) Virtual Smart Card Management Protocol Specification. Available online: http://msdn.microsoft.com/en-us/library/hh880895(prot.20).aspx (accessed on 22 October 2019).
  19. Apple Pay, Apple Inc. Available online: https://www.apple.com/apple-pay/ (accessed on 22 October 2019).
  20. UL’s Independent Assessment, “Apple Pay—What Do We Know?”, White Paper. 2014. Available online: https://www.ul-ts.com/catalog/offerings/knowledge-sharing/whitepapers-and-case-studies/landing/c-29/c-1684 (accessed on 22 October 2019).
  21. Pasquet, M.; Reynaud, J.; Rosenberger, C. Secure Payment with NFC Mobile Phone in the SmartTouch Project. In Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS), Irvine, CA, USA, 19–23 May 2008; pp. 121–126. [Google Scholar]
  22. Paillès, J.C.; Gaber, C.; Alimi, V.; Pasquet, M. Payment and Privacy: A Key for the Development of NFC Mobile. In Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems (CTS), Chicago, IL, USA, 17–21 May 2010; pp. 378–385. [Google Scholar]
  23. Mainetti, L.; Patrono, L.; Vergallo, R. IDA-Pay: An Innovative Micro-Payment System Based on NFC Technology for Android Mobile Devices. In Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 11–13 September 2012; pp. 1–6. [Google Scholar]
  24. Urien, P.; Piramuthu, S. Securing NFC Mobile Services with Cloud of Secure Elements (CoSE). In Proceedings of the 5th International Conference on Mobile Computing, Applications and Services (MobiCASE), Paris, France, 7–8 November 2013; pp. 322–331. [Google Scholar]
  25. De Luna, I.R.; Ramos, I.; Montoro-Ríos, F.; Liébana-Cabanillas, F.J. New perspectives on payment systems: Near field communication (NFC) payments through mobile phones. Mob. Commer. Concepts Methodol. Tools Appl. 2018, 1487–1507. [Google Scholar] [CrossRef]
  26. Yen-Jing, N. Near field communication (NFC) mobile payment in Malaysia: A partial least square-structural equation modelling (PLS-SEM) approach. Int. J. Model. Oper. Manag. 2019, 134–160. [Google Scholar] [CrossRef]
  27. Park, C.-H.; Park, C.-S. Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction. J. Korea Inst. Inf. Secur. Cryptol. 2015, 25, 1175–1186. [Google Scholar] [CrossRef] [Green Version]
  28. Al-Tamimi, M.; Al-Haj, A. Online Security Protocol for NFC Mobile Payment Applications. In Proceedings of the 2017 8th International Conference on Information Technology (ICIT), Singapore, 27–29 December 2017; pp. 827–832. [Google Scholar]
  29. Madhoun, N.; Pujolle, G. Security Enhancements in EMV Protocol for NFC Mobile Payment. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 1889–1895. [Google Scholar]
  30. Haselsteiner, E.; Breitfuß, K. Security in Near Field Communication (NFC). In Proceedings of the RFIDSec’06 on RFID Security, Graz, Austria, 12–14 July 2006. [Google Scholar]
  31. Madlmayr, G.; Langer, J.; Kantner, C.; Scharinger, J. NFC Devices: Security and Privacy. In Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES), Technical University of Catalonia, Barcelona, Spain, 4–7 March 2008; pp. 642–647. [Google Scholar]
  32. Damme, G.V.; Wouters, K.; Preneel, B. Practical Experiences with NFC Security on mobile Phones. In Proceedings of the RFIDSec’09 on RFID Security, Leuven, Belgium, 30 June–2 July 2009. [Google Scholar]
  33. Nelson, D.; Qiao, M.; Carpenter, A. Security of the Near Field Communication Protocol: An Overview. J. Comput. Sci. Coll. 2013, 29, 94–104. [Google Scholar]
  34. Levi, M.; Bissell, P.; Richardson, T. The Prevention of Cheque and Credit Card Fraud; Paper No. 26; Crime Prevention Unit: London, UK, 1991. [Google Scholar]
  35. Bond, M.; Choudary, O.; Murdoch, S.J. Chip and Skim: Cloning EMV Cards with the Pre-Play Attack. Comput. Res. Repos. (CoRR) 2012, arXiv:1209.2531. [Google Scholar]
  36. Blaze, M.; Ioannidis, J.; Keromytis, A.D. Offline Micropayments without Trusted Harware. In Proceedings of the 5th International Conference on Financial Cryptography, Grand Cayman, British West Indies, 19–22 February 2001; pp. 21–40. [Google Scholar]
  37. Rivest, R.; Shamir, A. PayWord and MicroMint: Two Simple Micropayment Schemes. In Proceedings of the Security Protocols Workshop on Security Protocols, Cambridge, UK, 10–12 April 1996; pp. 69–81. [Google Scholar]
  38. Lin, I.C.; Hwang, M.S.; Chang, C.C. The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptogr. 2005, 36, 53–67. [Google Scholar] [CrossRef]
  39. Fan, L.M.; Liao, J.X. Discrete Micropayment Protocol based on Master-Slave Payword Chain. J. China Univ. Posts Telecommun. 2007, 14, 58–60. [Google Scholar] [CrossRef]
  40. Fan, C.I.; Liang, Y.K.; Wu, C.N. An anonymous fair offline micropayment scheme. In Proceedings of the 2011 International Conference on Information Society (i-Society), London, UK, 27–29 June 2011; pp. 377–381. [Google Scholar]
  41. Yen, S.M.; Lin, H.C.; Chen, Y.C.; Hung, J.J.; Wu, J.M. PayStar: A Denomination Flexible Micropayment Scheme. J. Inf. Sci. 2014, 259, 160–169. [Google Scholar] [CrossRef]
  42. Kim, S.; Lee, W. A PayWord-based Micropayment Protocol Supporting Multiple Payments. In Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN), Double Tree Lincoln Centre, UK, 20–22 October 2003; pp. 609–612. [Google Scholar]
  43. Esmaeeli, A.; Shajari, M. MVPayword: Secure and Efficient Payword-based Micropayment Scheme. In Proceedings of the 2nd International Conference on the Web Technologies (ICADIWT), London, UK, 4–6 August 2009; pp. 609–614. [Google Scholar]
  44. Huszti, A. Multi-Vendor PayWord with Payment Approval. In Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NA, USA, 22–25 July 2013. [Google Scholar]
  45. Yang, M.H. Security Enhanced EMV-based Mobile Payment Protocol. J. Sci. World J. 2014. [Google Scholar] [CrossRef] [PubMed]
  46. Liu, M.; Xin, Y.; Yang, Y.; Niu, X. Security Mechanism Research of EMV2000. In Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology–Workshops (WI–IATW), Silicon Valley, CA, USA, 2–5 November 2007; pp. 307–310. [Google Scholar]
  47. Murdoch, S.J.; Drimer, S.; Anderson, R.; Bond, M. “Chip and PIN is Broken”. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP), Berleley/Oakland, CA, USA, 16–19 May 2010; pp. 433–446. [Google Scholar]
  48. Hancke, G.P. Practical Eavesdropping and Skimming Attacks on High-frequency RFID Tokens. In Proceedings of the 2010 Workshop on RFID Security, Singapore, 22–23 February 2010; pp. 259–288. [Google Scholar]
  49. Bhole, V.A.; More, R.R.; Khadke, N.C. Security in Near Field Communication (NFC) Strengths and Weaknesses. In Proceedings of the 2nd National Conference on Emerging Trends in Information Technology (EIT); I K International Publishing House Pvt. Ltd.: Delhi, India, 2007; pp. 71–79. [Google Scholar]
  50. ITU-T Recommendation X.509 Information Technology—Open System Interconnection—The Directory Public-Key and Attribute Certificate Frameworks; ISO/IEC 9594-8:2008; International Telecommunication Union: Geneva, Switzerland, 2008.
  51. Gong, L.; Needham, R.; Yahalom, R. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 7–9 May 1990; pp. 234–248. [Google Scholar]
Figure 1. EOPMA infrastructure.
Figure 1. EOPMA infrastructure.
Sensors 19 04611 g001
Figure 2. EOPMA flowchart.
Figure 2. EOPMA flowchart.
Sensors 19 04611 g002
Figure 3. Simple offline transaction credit splitting diagram.
Figure 3. Simple offline transaction credit splitting diagram.
Sensors 19 04611 g003
Figure 4. Offline certificate application and split credit line authorization processes.
Figure 4. Offline certificate application and split credit line authorization processes.
Sensors 19 04611 g004
Figure 5. Offline certificate application and split credit line authorization protocol.
Figure 5. Offline certificate application and split credit line authorization protocol.
Sensors 19 04611 g005
Figure 6. Offline transaction process.
Figure 6. Offline transaction process.
Sensors 19 04611 g006
Figure 7. Offline/online transaction protocol.
Figure 7. Offline/online transaction protocol.
Sensors 19 04611 g007
Figure 8. Process of merchant payment request.
Figure 8. Process of merchant payment request.
Sensors 19 04611 g008
Figure 9. Merchant payment request protocol.
Figure 9. Merchant payment request protocol.
Sensors 19 04611 g009
Figure 10. Extra computation time.
Figure 10. Extra computation time.
Sensors 19 04611 g010
Table 1. Sequence numbers and random numbers of secret factors.
Table 1. Sequence numbers and random numbers of secret factors.
Serial NumberRandom Nonce
S N w R w
S N s R s
Table 2. Security comparison chart.
Table 2. Security comparison chart.
EOPMAEPMARAl-TamimiModhounEMV-CDAEMV-DDAEMV-SDA
Exceeding of a credit quotaOXXXXXX
Malicous phoneOOOOOOO
Malicous merchantOOOOXXX
ConfidentialityOOOOXXX
Replay attacksOOOOXXX
Data privacyOOOOXXX
IntegrityOOOOOOO
Non-repudiationOOOOOXX
MITM attacksOOXOOXX
Clone attacksOOOOXXX
Fully EMV-CompatiableOOXOOOO
Table 3. Notations of the GNY proof.
Table 3. Notations of the GNY proof.
IIssuer
MMerchant
PUser’s NFC phone
{ X } K , { X } K 1 Uses the symmetric key K to encrypt/decrypt the message X.
{ X } + K , { X } K Uses the asymmetric key K to encrypt/decrypt the message X.
H ( X ) Message X is protected by the one way hash function H ( X ) .
P X P is told message X.
P X P possesses message X.
X X is generated by others; P X means P is told for X which he did not convey previously.
P # ( X ) P believes X is fresh. X has not been used at any time in the prior protocol, or sent by an attacker.
For example, a random number or a counter.
P ( X ) P believes X is recognizable.
P P S Q P believes S is shared by P and Q.
P P + K Q P believes Q owns the private key K correspondent to the public key + K .
P Q X P believes Q sent X.
Table 4. Initial assumptions.
Table 4. Initial assumptions.
Phone
P K e m v , + K e m v , K e n c e m v , T K The phone keeps a virtual credit card’s public key, private key,
P P K e n c e m v I and the shared encryption key.
P P T K M The phone generates a session key T K with a merchant during a transaction.
P + K i s s I The phone holds the issuer’s public key.
P ( I D M g ) The phone knows the merchant’s ID.
Merchant
M I D M g , T K The merchant owns his identity,
M M T K P the shared session key T K with the phone,
M M + K e m v P credit card’s public key,
M M + K i s s P and the issuer’s public key.
Issuer
I K i s s , + K i s s , K e n c e m v , K β The issuer has its own private key and public key,
I I K e n c e m v P the shared key with the phone,
I + K e n c e m v P the transaction key.
I ( I D M g ) The issuer knows the merchant’s identity,
I # ( R l i m ) and uses a random number for verification.
Table 5. Goals of proposed protocol.
Table 5. Goals of proposed protocol.
Phase 3, offline certificate application and split credit quota authorization
P I # ( R l i m ) The phone believes R l i m and C e r t o f f is generated by the issuer,
P I # ( R l i m ) gets the shared key K β .
P I # ( K β , w n , S N w , s o , b , φ , R l i m ) Finally both of them believes all the messages are fresh
P ( K β , w n , S N w , s o , b , φ , R l i m ) and are recognizable.
P P K β I
P I C e r t o f f
P I C e r t o f f
Phase 4, offline and online transactions
M P C e r t o f f The merchant believes the phone has the offline certificate C e r t o f f ,
M P ( μ ) and he believes μ is generated by the phone.
M P ( μ ) Finally the two parties believe the μ is fresh
M P # ( β , φ , w b , w b + c , c , c o u n t e r , I D M g ) and is recognizable.
M ( β , φ , w b , w b + c , c , c o u n t e r , I D M g )
Phase 5, payment request by merchant
I M ( μ ) Both the issuer and the merchant believe μ is recognizable,
I M ( β , φ , w b , w b + c , c , c o u n t e r , I D M g ) and the issuer believes β is recognizable.
I ( β )
I ( s v , S N w , S N s , R l i m )
Table 6. Proving process.
Table 6. Proving process.
Phase 3
Message M R l i m , { C e r t o f f } K e n c e m v The merchant and the issuer has built an secure channel
1.1 M I R l i m , { C e r t o f f } K e n c e m v /* IA */all the messages between them can be trusted.
M # ( R l i m , { C e r t o f f } K e n c e m v ) /* IA */
M ( R l i m , { C e r t o f f } K e n c e m v ) /* IA */
Message P { R l i m } T K , { C e r t o f f } K e n c e m v The phone believes TK is fresh.
1.2 P { R l i m } T K , { C e r t o f f } K e n c e m v /*T1*/believes μ is generated by the phone.
P R l i m , C e r t o f f /* T3 */Finally both of them believes the μ is fresh
P R l i m , C e r t o f f /* P1 */and is recognizable.
P # ( R l i m ) /* F3 */
P # ( R l i m ) /* R4 */
P # ( C e r t o f f ) /* F3 */
P # ( C e r t o f f ) /* R4 */
P K β , w n , S N w , s 0 , b , φ , R l i m /* T3 */
P K β , w n , S N w , s 0 , b , φ , R l i m /* P1 */
P ( K β , w n , S N w , s 0 , b , φ , R l i m )
P P K β I /* J1 */
Phase 4
Message P R e q , { D a t a e m v } T K The phone believes T K is fresh,
2.1 P R e q , { D a t a e m v } T K /* T1 */and D a t a c d o l 1 is recognizable.
P D a t a c d o l 1 /* T3 */Therefore, D a t a c d o l 1 is not forged or replayed.
P D a t a c d o l 1 /* P1 */
P D a t a c d o l 1 /* R2 */
Message M { μ } T K The merchant believes T K is fresh, and μ is not forged.
2.2 M { μ } T K /* T1 */The merchant gets the public key + K e m v of the credit card.
M μ /* T3 */Therefore, the merchant can vertify the message μ by φ .
M μ /* P1 */
M # ( μ ) /* F4 */
M β , φ , w b , w b + c , c , c o u n t e r , I D M g /* T6 */
M β , φ , w b , w b + c , c , c o u n t e r , I D M g /* P1 */
M ( β , φ , w b , w b + c , c , c o u n t e r , I D M g
M ( φ ) /* R3*/
M w 0 /* T6 */
M w 0 /* T6 */
M w 0 /* P1 */
Message I μ The issuer and the merchant has established a secure channel,
3 I μ /* IA, T1*/all the messages exchanged between them can be trusted.
I M μ / I A / The issuer gets phone’s public key + K e m v , and the shared
I μ / P 1 / key K β .
I # ( μ ) /* IA, F4 */Therefore, the issuer can verify the message μ and β .
I ( μ ) . /* IA, R3 */
I β , φ , w b , w b + c , c , c o u n t e r , I D M g /* T6 */
I β , φ , w b , w b + c , c , c o u n t e r , I D M g /* P1*/
I ( w b , w b + c , c , c o u n t e r , I D M g
I # ( β ) /* F2 */
I ( β ) /* R2 */
I ( φ ) /* R3*/
I s v , S N w , S N s , R l i m /* T3 */
I s v , S N w , S N s , R l i m /* T3 */
I s v , S N w , S N s , R l i m /* T3 */
I ( s v , S N w , S N s , R l i m )
Table 7. The operation time of cryptography functions (ms).
Table 7. The operation time of cryptography functions (ms).
OperationsTime
AES-128 ( T A )0.15
HMAC-128 ( T H )0.16
HMAC-256 ( T H 256 0.25
Random number generation0.01
RSA encrypt ( T R S A E )0.59
RSA decrypt ( T R S A D )5.67
Table 8. The extra operations of EOPMA, comparing to EPMAR.
Table 8. The extra operations of EOPMA, comparing to EPMAR.
OperationsPhoneMerchantIssuer
Phase 1000
Phase 2000
Phase 3 T A + n T H + T R S A D T A + T R S A E + T R S A D + T H 6 T r + n T H + T R S A E + T R S A D
Phase 4 T A + T R S A E ( c b ) T H + T A + T R S A D 0
Phase 500 T A + T R S A D + ( c b ) T H

Share and Cite

MDPI and ACS Style

Luo, J.-N.; Yang, M.-H. EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication. Sensors 2019, 19, 4611. https://doi.org/10.3390/s19214611

AMA Style

Luo J-N, Yang M-H. EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication. Sensors. 2019; 19(21):4611. https://doi.org/10.3390/s19214611

Chicago/Turabian Style

Luo, Jia-Ning, and Ming-Hour Yang. 2019. "EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication" Sensors 19, no. 21: 4611. https://doi.org/10.3390/s19214611

APA Style

Luo, J. -N., & Yang, M. -H. (2019). EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication. Sensors, 19(21), 4611. https://doi.org/10.3390/s19214611

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop