In researching EMV and NFC technologies, Mercator Advisory Group often suggests that Near Field Communication is sure to be adopted after merchants and consumers recognize how cumbersome it is to use EMV, since the card must remain in the point of sale (POS) terminal until the transaction is completed. This made us wonder, “Why must the EMV card stay in the POS for so long?”
The short answer to this question is enhanced card security, but the technical reason is the need for the chip in the card to verify that the authorization response received from the bank was indeed from the card-issuing bank and not a phony transaction injected by a hacker. It is also required so the issuer can update the card with new antifraud parameters included in the authorization request. See the diagram and process description below.
- The terminal sends a random number to the EMV card. The EMV card encrypts the authorization request using its crypto key and delivers this ARQC message to the POS, which sends it to the issuing bank.
- The auth request is received by the issuing bank.
- The issuing bank validates that the card delivered the correct crypto key. The issuer then decides if funds are available, creates an encrypted response (ARPC) with the issuer’s key, and sends the card commands as needed.
- The POS terminal sends the issuer’s Auth Response Cryptogram to the card.
- The card validates the issuer created the response by validating the issuer’s cryptogram.
- If the issuer sent card commands, the card executes the commands.
- If the card is not present in the POS, the POS terminal sends a transaction reversal to the issuer
The process described above uses the term ARQC for the authorization message and ARPC as the term that describes the bank’s response. Below are the definitions for the ARQC and ARPC quoted from the Visa document “Chip Terms Explained: A Guide to Smart Card Terminology”
“ARQC – Authorization Request Cryptogram
A cryptogram used for a process called Online Card Authentication. This cryptogram is generated by the card for transactions requiring online authorization. It is the result of card, terminal, and transaction data encrypted by a DES key. It is sent to the issuer in the authorization or full financial request. The issuer validates the ARQC to ensure that the card is authentic and card data was not copied from a skimmed card.
ARPC – Authorization Response Cryptogram
A cryptogram used for a process called Online Issuer Authentication. This cryptogram is the result of the Authorization Request Cryptogram (ARQC) and the issuer’s authorization response encrypted by a DES key. It is sent to the card in the authorization response. The card validates the ARPC to ensure that it is communicating with the valid issuer.”
EMV brings new terminology and new technology to the United States. In addition, it will force some changes in consumer behavior, particularly at the POS device. One question that is often asked is “Does the chip card really need to stay in the terminal for the duration of the transaction?” When using a contact chip card, the short answer is YES. Continue reading to find out why.
One of the primary business reasons for implementing EMV is that is greatly reduces counterfeit fraud through the use of a unique encrypted value, called an application cryptogram, that is generated by the card for each transaction. To generate this application cryptogram, the card uses (among other things) a special key, which is sometimes called the card master key, which is inserted into the chip when the card is personalized. The card master key is derived from a master key known to the issuer, but the card master key is unique for each card. When a transaction request needs to be sent online to a host system for authorization, the card uses its card master key (among other elements) to generate an Application Request Cryptogram (ARQC). The ARQC is included in the online transaction request to the issuer. By validating the ARQC, the issuer can be assured that the transaction data is from a genuine card, i.e., a card that has not been cloned or counterfeited. The issuer may, in turn, generate an Authorization Response Cryptogram (ARPC) that is sent back to the chip card as part of the response message. By validating the ARPC, the card can be assured that the response came from the true issuer. (A processor or other entity can perform the cryptogram validation and generation on behalf of the issuer if they have the appropriate key.)