A SIMULATION OF AN EMV TRANSACTION AND A NO-PIN ATTACK AGAINST IT

dc.contributor.advisorMurdoch, Steven J.
dc.contributor.authorAldawas, Haitham Saleh
dc.date.accessioned2024-03-05T10:32:50Z
dc.date.available2024-03-05T10:32:50Z
dc.date.issued2024-02-01
dc.description.abstractThe EMV (Europay, MasterCard, and Visa) standard, which is commonly used for card transactions globally, is thoroughly examined in this dissertation. Starting with the purpose and motivation for the study, it examines the history of the EMV system and describes its structure by explaining the four EMV books that cover topics ranging from security to interface specifications. The study deconstructs the protocol phases and reveals potential weaknesses by looking at different attack strategies, including the replay attack, fallback attack, and, most significantly, the no-PIN attack. Understanding EMV transactions, an the No-PIN Attack, are the main objectives of this study. The methodology used entails choosing particular hardware, software, and simulation-related procedures. The research suggests a thorough lesson plan to facilitate learning that includes both theoretical and practical sessions with the goal of giving participants a solid understanding of EMV transactions, its weaknesses, and practical experience of the No-PIN attack. Using components such as the Raspberry Pi Pico and the RFID Reader/Writer MFRC522, the study’s practical aspect is demonstrated. By the end, participants should be able to not only understand the complexities of EMV transactions but also critically assess their understanding and effectively express it. The study comes to a conclusion by evaluating the results and listing the key conclusions.
dc.format.extent98
dc.identifier.urihttps://hdl.handle.net/20.500.14154/71580
dc.language.isoen
dc.publisherUniversity College London
dc.subjectPayment Security
dc.subjectPoS security
dc.subjectEMV Security
dc.subjectCard Payment
dc.subjectBanking Security
dc.subjectFinancial Services Security
dc.subjectNo-PIN Attack
dc.titleA SIMULATION OF AN EMV TRANSACTION AND A NO-PIN ATTACK AGAINST IT
dc.typeThesis
sdl.degree.departmentComputer Science
sdl.degree.disciplineInformation Security
sdl.degree.grantorUniversity College London
sdl.degree.nameMaster of Science

Files

Copyright owned by the Saudi Digital Library (SDL) © 2025