HTTP/2 200 date: Fri, 29 Oct 2021 21:16:46 GMT content-type: text/html; charset=UTF-8 cf-ray: 6a5f6d468e3d05c6-IAD age: 32128 cache-control: max-age=0 expires: Fri, 29 Oct 2021 12:21:14 GMT last-modified: Fri, 29 Oct 2021 12:21:16 GMT link: ; rel="https://api.w.org/", ; rel="alternate"; type="application/json", ; rel=shortlink vary: X-Forwarded-Proto,Accept-Encoding cf-cache-status: HIT cf-apo-via: tcache cf-edge-cache: cache,platform=wordpress expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct" permissions-policy: interest-cohort=() report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FdlA5SK1vPMDxoQJfpiuIGDMeS7cswBfd4IwS8NLCEmlp2e0R82y7b%2BVbD%2FmEfSeCfLXrIykQDtSL3TYqlybzwwBruKuIAYiwI29dqxDaNwA2SP3fhedVG14CLii%2FA%3D%3D"}],"group":"cf-nel","max_age":604800} nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} server: cloudflare alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400 EMVCo adds support for elliptic curve cryptography • NFCW
EMVCo has issued a new specification bulletin that adds support for elliptic curve cryptography (ECC) to its EMV contact chip specifications to enable “robust EMV contact chip security long term as payment technologies evolve”.
The addition of support for ECC is detailed in Specification Bulletin 243[4] and applies to the EMV Integrated Circuit Card Specifications for Payment Systems v4.3.
Use of the ECC cryptography standard enables enhanced transaction security “without impacting on the technical performance of a payment device or slowing transaction processing time,” the standards body says.
“In an EMV contact chip payment, the merchant point-of-sale terminal can cryptographically authenticate a card and its data.
“For this purpose, EMVCo has based its EMV contact chip specifications on RSA (Rivest-Shamir-Adleman) public key cryptography since its inception and intends to continue to support this standard.
“The addition of ECC into EMV specification helps achieve superior cryptographic strength with much smaller key sizes, enabling more efficient transactions in the future.”
“The longer the cryptographic key used to secure a transaction, the more storage and processing power required. The size of a cryptographic key is therefore important,” EMVCo Executive Committee chair Robin Trickel explains.
“EMVCo recognises that RSA could continue to offer ‘stronger’ keys,