TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Target confirms PIN data was stolen in breach

3 pointsby ibsathishover 11 years ago

2 comments

lvhover 11 years ago
Article suggests that only a third party payment processor holds the key, yet also claims that the encryption algorithm is Triple DES. Either whatever&#x27;s doing the encryption <i>also</i> has the key, or there&#x27;s a random symmetric key for each entry that&#x27;s encrypted using the payment processor&#x27;s public key in some extra scheme that isn&#x27;t explained in the article. That would explain why they&#x27;re talking about a &quot;decryption&quot; key as a separate thing. (In the latter case, the thing doing the encryption technically also has the key; that&#x27;s hard to avoid with a symmetric algorithm such as 3DES; but one would hope that the system doing the encryption would forget about that key ASAP :))<p>From what I understand, PCI mandates that at least the terminals all have their own (re-used) encryption keys; but that wouldn&#x27;t fit with their story that the &quot;key never existed within their systems&quot;; unless that&#x27;s them being a bunch of weasels due to a technicality (perhaps they themselves do not actually own the terminals?)<p>Is there a source with more technical details available?
评论 #6985102 未加载
skywhopperover 11 years ago
&quot;Target ... said the PINs are &#x27;strongly encrypted&#x27;&quot;<p>Take this with a huge grain of salt. White hat analysis of the hacked Adobe database shows that &quot;strong encryption&quot; is only a very small piece of the puzzle for securely storing sensitive data.