Samir Chabbi

Work place: University of Souk Ahras / Department of Mathematics and Informatics, BP 1553 Souk Ahras 41000, Algeria

E-mail: s.chabi@univ-soukahras.dz

Website:

Research Interests: Cyber Security

Biography

Associate professor Samir Chabbi, University of Souk-Ahras / Department of Mathematics and Informatics, BP 1553 Souk-Ahras 41000, Algeria 
Major interests: embedded systems and cyber security in the field of Radio Frequency Identification (RFID) and Near Field Communication (NFC).

Author Articles
Finding and Mitigating a Vulnerability of the Color Wheel PIN Protocol

By Samir Chabbi Djalel Chefrour Nour El Madhoun

DOI: https://doi.org/10.5815/ijcnis.2024.05.09, Pub. Date: 8 Oct. 2024

There is an increasing usage in the banking sector of Smartphones enabled with Near Field Communication (NFC), to improve the services offered for the customers. This usage requires a security enhancement of the systems that employ this technology like the Automated Teller Machines (ATMs). One example is the Color Wheel Personal Identification Number (CWPIN) security protocol designed to authenticate users on ATMs using NFC enabled smartphones without typing the PIN code directly. CWPIN has been compared in the literature to several other protocols and was considered easier to use, more cost-effective and more resistant to various attacks on ATMs such as card reader skimming, keylogger injection, shoulder surfing, etc. Nevertheless, we demonstrate in this paper that CWPIN is vulnerable to the multiple video recordings intersection attack. We do so through concrete examples and a thorough analysis that reveals a high theoretical probability of attack success. A malicious party can use one or two hidden cameras to record the ATM and smartphone screens during several authentication sessions, then disclose the user's PIN code by intersecting the information extracted from the video recordings. In a more complex scenario, these video recordings could be obtained by malware injected into the ATM and the user's smartphone to record their screens during CWPIN authentication sessions. Our intersection attack requires a few recordings, usually three or four, to reveal the PIN code and can lead to unauthorized transactions if the user's smartphone is stolen. We also propose a mitigation of the identified attack through several modifications to the CWPIN protocol and discuss its strengths and limitations.

[...] Read more.
Other Articles