Automated teller machines: their history and authentication protocols

@article{Konheim2015AutomatedTM,
  title={Automated teller machines: their history and authentication protocols},
  author={Alan G. Konheim},
  journal={Journal of Cryptographic Engineering},
  year={2015},
  volume={6},
  pages={1-29}
}
  • A. Konheim
  • Published 1 April 2016
  • History
  • Journal of Cryptographic Engineering
Luther Simjian filed a patent in 1959 for perhaps the first ATM; he convinced the City Bank of New York (now Citibank) to run a 6-month field test of his Bankmatic. The test was, however, not extended due to lack of demand. Simjian suggested that the only customers using the machine were a small number of prostitutes and gamblers who did not want to deal with bank tellers face to face. Nature abhors a vacuum and is also the mother of invention; John Shepherd-Barron (OBE), managing director of… 
Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology
  • A. Konheim
  • Computer Science
    Journal of Cryptographic Engineering
  • 2018
TLDR
The early life of Horst Feistel is described, in particular, the events shaping his career, which led to the development of today’s high-grade cryptographic algorithms.
The diffusion of fintech, financial inclusion and income per capita
Advances in information and communication technology (ICT) have provided a platform for the introduction and diffusion of a range of financial technologies that have transformed the financial sector.
Financial Sector-Based Analysis of the G20 Economies Using the Integrated Decision-Making Approach with DEMATEL and TOPSIS
This study aims to evaluate the performance of G20 economies. For this purpose, financial sector-based factors are taken into the consideration. Within this framework, 9 different indicators are
Development of Cryptography since Shannon
TLDR
The development of cryptography since Shannon’s seminal paper “Communication Theory of Secrecy Systems” in 1949 is presented.

References

SHOWING 1-10 OF 69 REFERENCES
Number 641 Computer Laboratory UCAM-CL-TR-641 ISSN 1476-2986 Cryptographic processors – a survey
TLDR
This paper surveys the range of applications of tamperresistant hardware, and the array of attack and defence mechanisms which have evolved in the tamper-resistance.
The Evolution of Eft Networks from Atms to New On-Line Debit Payment Products
TLDR
Highlights from the NYCE presentation are provided, designed to address security issues in making payments over the Internet, and additional background research on the structure and evolution of debit cards are provided.
Decimalisation table attacks for PIN cracking
TLDR
An attack on hardware security modules used by retail banks for the secure storage and verification of customer PINs in ATM (cash machine) infrastructures is presented, using adaptive decimalisation tables and guesses that takes an average of 15 guesses to determine a four digit PIN.
SP 800-29. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
TLDR
This differences paper summarizes the changes from FIPS 140-1 to FIPS140-2 and documents the detailed requirements.
Hardware Security Modules
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate
Evidence from the patent record on the development of cash dispensing technology
There are but a handful of systematic studies on the history of automated teller machines (ATMs) yet all fail to address the issue of paternity while perpetrating dasiacommon wisdompsila beliefs.
The Design and Analysis of Cryptographic Application Programming Interfaces for Security Devices
TLDR
A number of innovative attacks are presented with significant implications for financial transaction systems (e.g. ATM networks) that challenge previous assertions of their security, integrity and robustness.
The Data Encryption Standard (DES) and its strength against attacks
TLDR
Some of the safeguards against differential cryptanalysis that were built into the DES system from the beginning are shown, with the result that more than 10 15 bytes of chosen plaintext are required for this attack to succeed.
Formal analysis of PIN block attacks
  • G. Steel
  • Computer Science
    Theor. Comput. Sci.
  • 2006
Blunting Differential Attacks on PIN Processing APIs
TLDR
This work proposes a countermeasure for a class of known attacks on the PIN processing API used in the ATM (cash machine) network, which adds an integrity check to the parameters passed to the command.
...
...