Computer Laboratory

Technical reports

Decimalisation table attacks for PIN cracking

Mike Bond, Piotr Zieliński

February 2003, 14 pages

Abstract

We present an attack on hardware security modules used by retail banks for the secure storage and verification of customer PINs in ATM (cash machine) infrastructures. By using adaptive decimalisation tables and guesses, the maximum amount of information is learnt about the true PIN upon each guess. It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000 guesses intended. In a single 30 minute lunch-break, an attacker can thus discover approximately 7000 PINs rather than 24 with the brute force method. With a £300 withdrawal limit per card, the potential bounty is raised from £7200 to £2.1 million and a single motivated attacker could withdraw £30–50 thousand of this each day. This attack thus presents a serious threat to bank security.

Full text

PDF (0.2 MB)

BibTeX record

@TechReport{UCAM-CL-TR-560,
  author =	 {Bond, Mike and Zieli{\'n}ski, Piotr},
  title = 	 {{Decimalisation table attacks for PIN cracking}},
  year = 	 2003,
  month = 	 feb,
  url = 	 {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-560.pdf},
  institution =  {University of Cambridge, Computer Laboratory},
  number = 	 {UCAM-CL-TR-560}
}