Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Too convenient (Score 1) 252

It seems too convenient to leave a file called hack.bat on the system. Probably just a cover because the actually back door was created by the developer of the ATM system/software. The USB sticks simply unlocked the machine and the codes were used to prevent the individual perp from hitting too many ATMs, too frequently. The code doesn't stop the individual perp from walking away with the cash at that time but it does let someone know exactly when he's doing it.

I know of a gambling device that was similarly hacked by the developer... He was too greedy and used his hack twice in one weekend. He was also on the security video and he rented a car in his own name which makes him not only greedy but stupid as well.

As a side note the gambling device used proprietary hardware/OS and the system software is examined and certified by a third party. The back door was well hidden and because it was an inside job, the technical security of the device was irrelevant. I am guessing the same is true for the ATMs.

Comment right from the white paper (Score 5, Insightful) 195

SCIMP provides strong encryption, perfect forward secrecy and message authentication.Further, we have incorporated many NIST-approved methods and protocols into its design including:

  • Elliptic Curve Diffie–Hellman (ECDH), NIST 800-56A
  • Counter with CBC-MAC (CCM), NIST 800-38C
  • Key Derivation, NIST 800-108
  • Secure Hash Standard, FIPS 180-4
  • Advanced Encryption Standard (AES), FIPS 197

Does anyone else see a problem with with the wording "NIST-approved methods and protocols?" NIST/NSA

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...