Implementing Electronic Card Payment Systems (Artech House Computer Security Series)

The most obvious threat to a communication established between two parties, the sender A(lice) and the receiver B(ob), is a third party E(ve), also called eavesdropper or attacker, who wiretaps the communication channel, as schematized in Figure B.1.

Figure B.1: Communication channel wiretapping.

It can be argued that wiretapping is difficult, but, in fact, it is just a matter of cost. Tapping a telephone line is cheaper than tapping a communication held on a Bluetooth channel, an optical cable, or even a coaxial cable. Tapping an Internet connection is also much easier than penetrating the proprietary communication network of a card association. The attacker's determination to wiretap a communication line is motivated only by the potential gain, which should be higher than the cost of the technologies needed to break in. There are two major wiretapping possibilities. Passive wiretapping consists of listening in on the messages sent on the communication channel, which can result in unauthorized disclosure of information. Active wiretapping consists of intercepting, modifying, and then relaying the messages, which can result in the modification of the information transmitted between parties. Active wiretapping is more difficult than passive wiretapping.

Other threats can be associated with the attempts of the communicating parties to misbehave during the protocols carried out between them, which can result in false statements of the sender or receiver. This category of threats is meaningful for the communication between two parties that are mutually distrustful and try to repudiate a transaction after its completion. As an example, the cardholder and the issuing bank can be considered parties that are mutually distrustful. On one hand the cardholder can deny a previous money withdrawal at an ATM, hoping that the evidence about this transaction provided by the bank to a judge, who is called to arbitrate the dispute, will be not enough to incriminate him or her. On the other hand, a bank can falsely claim that the cardholder withdrew money from her account, while, in fact, this transaction never happened . In the real world the second scenario is less probable then the first scenario. However, a threat analysis has to identify all the possible deviations by parties from the normal behavior. It is also worth noticing that it is not the bank that is mounting the attack (after all, the bank is a role that is played by an actor), but rather a dishonest employee abusing the prerogatives of his position with the bank.

In the remainder of this appendix some of the generic threats related to the communication between two parties are discussed.

Категории