TryTRY
BuyBUY
  • newsletter
  • contact
  • corporate
  • careers
Utimaco
TRYour free HSM simulator
BUYget a quote
  • home
  • solutions
  • products
  • services
  • blog
  • downloads
  • partners
  • company

Utimaco Portal

Here you will find everything you need as a partner and customerLogin required

  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research

Home / Blogs / Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

Why does the Shift from PCI PTS v1 to v3 and PCI PIN Security Mandate a Key Block-Oriented Architecture?

November 09, 2020

This article highlights the use of key blocks for securing cryptographic keys under the latest versions of PCI PTS and PCI PIN Security.

New call-to-action

Since the exponential increase of digital assets in banking transactions, the requirement of cryptographic mechanisms for the protection of assets has also increased respectively. The evolving complexity of cyber-attacks and existing vulnerabilities in communication systems has made protecting cryptographic keys a huge challenge.

The top cryptographic security control for protecting business transactions is the hardware security module (HSM). Banks and enterprises use HSMs to protect their and their clients’ transactions.

The loss or compromise of crypto keys would lead to reputational loss, penal regulatory penalties, and loss of trust of clients and investors on the business.

The release of the latest version 3.0 of PCI PTS HSM and version 3.0 of PCI PIN Security Requirements and Testing Procedures strongly mandates the use of key blocks.

This article highlights the importance of key blocks for the security of cryptographic keys.

The Need for Key Blocks

The reason for fortifying cryptographic keys is to provide security and reliability that targets two basic requirements:

  • Key Usage Control: The usage, purpose, and type of keys should be strictly bound to ensure that the key cannot be used for unauthorized purposes.
  • Key Integrity: The key cannot be modified by an unauthorized party.

ASC X9 TR 31-2018 – Interoperable Secure Key Exchange Key Block Specification addresses the requirements for key blocks and standards for key blocks.

PCI Standards that Mandate the Use of Key Blocks.

  • PCI PTS HSM Version 3.0, released in June 2016, provides guidelines for HSMs for throughout their whole lifecycle (fabricating, conveyance, utilization, and decommissioning) for HSM sellers to follow under PCI PTS (PIN Transaction Security) HSM “Modular Security Requirements.” PCI PTS provides operational/technical security requirements for the protection of cardholder data along with cardholder authentication, payment processing, and cryptographic key management, etc. The principal goal of these requirements is to eliminate the possibility of business fraud and decrease its likelihood and confinement of its implications. All HSM vendors and applications that store, process, or transmit cardholder data must comply with this standard.
  • PCI PIN Security Requirements and Testing Procedures Version 3.0 released in August 2018, provides a set of comprehensive security requirements for the complete management (storage, processing, and transmission) of PIN data of offline & online payment card transactions processed by Point-of-Sale (POS) terminals and ATMs. The agenda for Implementation of Key Blocks was introduced as a new requirement for better security of encrypted keys, which greatly improves the security of symmetric keys that are shared among payment participants to protect PINs and other sensitive data.

Importance of Key Blocks

New call-to-actionAs mandated by PCI SSC & PCI DSS, the standard mechanism for protecting the integrity and usage/association of cryptographic keys is the implementation of key blocks. The payment data is protected by cryptographic keys, which are in turn protected by key blocks. Without the proper implementation of key blocks, banking solutions would be more vulnerable to attacks or breaches, resulting in potential payment data compromises.

Symmetric cryptographic algorithms use a single key for its mode of operation. However, there is a scenario of TDES (Triple DES) or TDEA where three keys are used. With TDES and TDEA, not only does the protection of keys matter but also their order because the order of the keys is critical to the strength of the resulting TDEA encryption. The order of the crypto keys cannot be assured without using key blocks.

What do key blocks successfully achieve?

Encryption keys must be used only for the purpose for which they were intended. For example, a PEK (PIN Encrypting Key) cannot be used as a KEK (Key Encrypting Key) and vice versa. Similarly, the keys for decryption and generation of digital signatures must be different. This segregation is necessary to limit the exposure of keys to maintain the strength of the overall system.

Key usage must be cryptographically bound to the key using accepted methods. Acceptable methods of implementing the integrity requirements include, but are not limited to:

  • A MAC computed over the concatenation of the clear-text attributes and the enciphered portion of the key block, which includes the key itself.
  • A digital signature computed over that same data.
  • An integrity check that is an implicit part of the key-encryption process, such as what is used in the AES key-wrap process specified in ANSI X9.102 – Symmetric Key Cryptography for the Financial Services Industry – Wrapping of Keys and Associated Data.

Implementation Timeline of Key Blocks

New call-to-actionThe PCI PIN Security – Requirement 18-3 Key Blocks mandates that encrypted symmetric keys should be managed in key block structures. Key blocks must be used for all types of PIN security-relevant symmetric keys, including:

  • PEK (PIN-Encryption Keys)
  • KEK (Key-Encipherment Keys)
  • ZMK (Zone Master Keys)
  • BDK (Base Derivation Keys)
  • TMK (Terminal Master Keys)

PCI SSC has rolled out a phase-wise implementation of three phases with each having its own effective date. The main aim to divide into three phases is to allow organizations to focus resources to address implementation tasks specific to their environment and support a smooth migration across the payments network.

The phase-wise implementation plan is as follows:

Version Release Date Description
1.0 June 2019 Implement key blocks for internal connections and key storage within service provider environments. This would include all applications and databases connected to HSMs.
2.0 June 2021 Implement key blocks for external connections to associations and networks.
3.0 June 2023 Implement key blocks to extend to all merchant hosts, point-of-sale (POS) devices, and ATMs.

Structure of a Key Block

A key block provides confidentiality (secret data/keys cannot be disclosed) and integrity (associated data cannot be modified without detection) of the key(s). The integrity of a key block is protected as well.

A key block contains the attributes that allow vendors and implementers to design policies for specific key types, e.g. if the HSM knows that a given key is a PIN key, it will not allow its use for non-PIN data.

Similarly, if the HSM knows that a key is a key-encrypting key, it will not allow it to encrypt data. Vendors enforce these policies based on attributes to prevent attacks against the keys. The attacks on cryptographic keys were successful only in the scenarios where these attributes and policies were not effectively enforced.

Conclusion

HSMs are widely deployed in corporations for effective management and security of crypto keys.

PCI PTS HSM version 1.0 was released in April 2009 and various HSMs and cryptographic modules were validated against this standard. A general public notice was issued by PCI SSC stating that the approval of devices validated using PCI PTS HSM version 1.0 expired on 30 April 2019.

The latest versions of PCI PTS HSM and PIN Security Requirements strongly mandate the compliance of key blocks. Validations carried out older HSMs do not comply with the latest HSM security requirements and standards. They may not be able to withstand the latest generations of attacks and should, therefore, be replaced with key block-oriented, architecture-based hardware.

New call-to-action

References

  • More articles on PCI PTS HSM v1 – v3 (2018 – today), by Asim Mehmood, Martin Rupp and more
  • More articles on the AT1000 (2018 – today), by Martin Rupp and the Utimaco team.
  • Atalla HSM AT1000 – PCI HSM 3.0 Security Policy (August 2019), by Utimaco
  • ASC X9 TR 31-2018 – Interoperable Secure Key Exchange Key Block Specification (2018), by Accredited Standards Committee X9, Incorporated Financial Industry Standards
  • Payment Card Industry (PCI) PTS HSM Security Requirements –Technical FAQs for use with Version 3.0 (November 2018), by PCI Security Standards Council
Back to overview

Stay on top of our news
Don’t miss out on any Utimaco updates

Subscribe to Utimaco Newsletter

We will keep you posted with news from Utimaco and the industries we protect, as well as information on upcoming events and webinars.

Subscribe now

Partners

Real security d.o.o. CewTec S.A. Fornetix - Utimaco Hardware Security Modules Partner IQuantics Corp AKEA S.A. - Utimaco Hardware Security Modules Partner Skytech Computing Solutions Limited. - Utimaco Hardware Security Modules Partner SecureMetric Technology Sdn. Bhd. Cryptomathic Inc. E-Sign S.A. Utimaco HSM - InfoGuard Swiss Cyber Security Compumatica secure networks GmbH Throughwave (Thailand) Co.,Ltd - Utimaco Hardware Security Modules Partner Abrantix AG JJNet International Co., Limited - Utimaco Hardware Security Modules Partner Secure Source Distribution (M) Sdn Bhd - Utimaco Hardware Security Modules Partner Synergy Computers (Pvt.) Ltd. - Utimaco Hardware Security Modules Partner Versasec PKI Solutions Inc. MTG - Utimaco Hardware Security Modules Partner Baas Control s.r.o. Altacom UAB ESYSCO Sp. z o.o. Ascertia - Utimaco Hardware Security Modules Partner Fortiedge Pte Ltd. Encryption Consulting LLC Envoy Data Corporation - Utimaco Hardware Security Modules Partner Perceptus-sp.-z-o.-o. PrimeKey Labs GmbH Cryptomathic GmbH Safesoft Kft. Astel (UK) Ltd. - Utimaco Hardware Security Modules Partner CEGA Security Primekey Solutions AB Softline Solutions GmbH Clearkey Consulting - Utimaco Hardware Security Modules Partner cv cryptovision GmbH Telegrupp AS Cogito Group Pty Ltd MALKOM D.Malińska i Wspólnicy s.j. Komar Consulting Inc. - Utimaco Hardware Security Modules Partner Utimaco HSM - QuintessenceLabs Nexus Technology GmbH intarsys AG Nexus - Utimaco Hardware Security Modules Partner Microexpert Limited CREA plus d.o.o. CertiSur S.A. Nexus - Utimaco Hardware Security Modules Partner Cryptomathic A/S CREAplus Italia S.r.l Macroseguridad MIcrosec VAR Group SpA - Utimaco Hardware Security Modules Partner Compumatica secure networks B.V. Cyber Armor Pte Ltd PETA (Thailand) Co., Ltd. Rohde & Schwarz Cybersecurity GmbH Utimaco HSM - PTESA_profesionales en transacciones electronicas Thomas-Krenn.AG EUROPEAN DYNAMICS SA.
Find a partner

Share this page

EMEA

Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200

Americas

Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO

APAC

Utimaco IS Pte Limited
80 Raffles Place,
#32-01, UOB Plaza
Singapore 048624
Phone: +65 6622 5347

Utimaco

  • support
  • corporate
  • careers
  • legal
  • terms & conditions
  • privacy
  • cookie-policy
© 2021
to top
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research