SlideShare a Scribd company logo
4
Most read
9
Most read
14
Most read
Futurex Solutions Overview
SKI9000
Direct Key Injection Solution
Agenda
• About Futurex
• SKI Series Overview
• Security Features
• Regulatory Compliance
• DUKPT Key Injection Overview
• Contact Details
Futurex. An Innovative Leader in
Encryption Solutions.
• For over 30 years, more than 15,000 customers worldwide have
trusted Futurex solutions to protect their highly sensitive data
• Hardware-based solutions with diverse applications in
electronic payments and general-purpose data security
• Entrepreneurial culture, fostering agility and innovation in the
development of hardware encryption solutions with cross-
platform, multidimensional applications
• Results-oriented engineering team based entirely out of our
U.S. Technology Campus, with significant experience
delivering First-to-Market Customer Initiatives
SKI Series – Secure Key Injection
Futurex SKI Series
ATM PIN Pads
Key Comp
2
Point of Sale Terminals
Secure Injection Facility
Cost Effective
•Inject up to sixteen POS terminals or ATM PIN pads at a time
•Graphical user interface reduces training and administration costs
Versatile
•Supports most major terminal manufacturers and most key types, including Master/Session
and 3DES DUKPT
•Provides detailed audit records and the ability to generate key reports
Key Comp
1
Why Did Futurex
Develop the SKI Series?
• Adoption of ASC X9.24 - Part 1, which mandates the use of
hardware-based encryption devices, by the major card brands has
made it no longer acceptable to use software-based encryption to
protect payment keys.
• Existing key injection solutions are limited in capability and are
outdated, often lacking support for multiple terminal
manufacturers and a graphical user interface.
• Storing keys as cryptograms or in a Tamper-Resistant Security
Module (TRSM) dramatically reduces the risk of key exposure.
• As key usage expands, the complexity of managing and tracking
keys increases.
SKI Series Features
• Eliminates the costly manual process of loading
multiple keys
• Supports all major key types
• Prints labels with device ID and key serial number for
convenient tracking
• Scalable to perform up to sixteen injections at once
• Easy-to-use GUI significantly reduces training and
administration costs
• Keys exportable to the Futurex RKMS Series
Remote Key Management Server
Security Features
Physical Security
• Two independent front panel locks
protected by individual barrel keys
that are highly resistant to picking
and/or duplication
• CD-ROM drive hidden behind front
panel
• “Puzzle Box” design with hardened
steel casing and interlocking
components
• TRSM with epoxy barrier and sensor
wires to protect processor and
system memory
• Serial ports connected directly to
TRSM
Logical Security
• Dual logins required to access
application
• User group permissions control
privileges within application
• Keys stored as cryptograms under
MFK or KEK
• Key component entry occurs in
separate steps, each with
individual check digit display
• Complete, authenticated audit log
files of all activity and access
• Standard reports and
customizable queries from
audit log files
Additional Features and Benefits
Feature Benefit
Supports easy, compliant direct key
loading into POS terminals
- Provides flexibility in key loading operations
- Reduces training for key loaders
- Reduces errors and re-work
Loads keys directly from a FIPS 140-2
Level 3-certified Tamper Resistant
Security Module (TRSM)
- Meets new industry requirements for secure
key injection
- Improves the security of your online
transactions
POS terminal keys to be injected can
be stored on the hard drive as
cryptograms
- It is not necessary to re-enter the key for each
injection, dramatically improving total injection
speed
Detailed audit records and ability to
easily generate reports from these
records
- Ability to easily manage internal and external
TR-39 audits
Easy to use Graphical User Interface
(GUI)
- Reduces training requirements for key loaders
- Reduces errors and re-work
Regulatory Compliance – Secure Room
• Required for any organization that must undergo a TR-39 audit
• Secure room requirements:
o Mandatory dual access
o No connection to outside networks
o Auditable use and visitor logs
o Access restricted to authorized personnel
• How does the secure room apply to Point of Sale terminal
manufacturers?
o Clear keys must be loaded within a secure room
o Certificate authorities must be generated, stored, and managed
within a secure room
• Futurex’s CTGA-certified Solutions Architects have secure
room expertise and can provide training assistance
in the design and implementation process
Overview – DUKPT Key Injection
DUKPT Features
• DUKPT (Derived Unique Key Per Transaction) ensures that a different key is
used for every transaction
• A DUKPT key consists of two parts:
– BDK (Base Derivation Key), the working key that is used for encryption
– KSN (Key Serial Number), the unique serial number that is injected into each device
• After every transaction, a new DUKPT key is derived from the incremented
KSN which is used to encrypt the PIN
SKI Series
Point of Sale Terminals
Secure Injection Facility
BDK KSN
Overview – DUKPT Key Injection
SKI Series
POS
Terminal
Secure Room
The SKI Series is fully compliant with the Triple-DES DUKPT standard and is capable of
automatically deriving unique IDs for each terminal injected. This is designed to maintain
high injection throughput and requires an absolute minimum of configuration and input
from key officers
Key Comp(BDK)
2
Key Comp(BDK)
1
KSN
Point of Sale
Host/Bank
Excrypt™ SSP Series
Hardware Security Module
(HSM)
Key Serial Number
• The Key Serial Number (KSN) is the unique serial number that is injected into
each POS terminal
• The KSN consists of five parts concatenated together
– Issuer Identification Number
• Unique per issuer
– Customer ID Number
– Group Identifier Number
– Unique Device ID
• Incremented after every device injection
– Transaction Counter
• Incremented after every transaction
• The KSN ensures that all transactions use a unique key which has been
derived from the original BDK
Overview – DUKPT Key Injection
SKI Series
POS
Terminal
Secure
Room
From within a secure room or facility, the Base Derivation Key (BDK) and Key Serial Number (KSN) are
loaded onto the SKI Series. To ease the process of loading multiple keys on multiple different
terminals, the device is designed with a cryptogram export and import feature.
Key Comp(BDK)
2
Key Comp(BDK)
1
KSN
Once the BDK and the KSN have both been loaded, the POS terminal can be injected via the point-and-click
GUI. The KSN will also increment automatically when keys are shared between multiple terminal types.
KSN Components
Bit Range Byte
Range
ID Definition
1-24 1-3 IIN Issuer Identifier Number
25-32 4 CID Customer ID Number
32-40 5 GID Group Identifier Number
41-59 6-~8 DID Unique Device ID
60-80 ~8-10 TC Transaction Counter
Overview – DUKPT Key Injection
Once injected, the POS terminals can be instantly deployed into a production environment.
The KSN will automatically increment after each transaction, ensuring compliance with
the ANSI X9.24 regulations requiring the use of DUKPT.
Point of Sale
Host/Bank
Excrypt™ SSP Series
Hardware Security Module (HSM)
Host Database
Futurex SKI9000 – Key Exchange
Process Flow Diagram
This procedure outlines the process by which users may export keys from an external host and import
them into the SKI9000, encrypted under a mutually-shared Key Exchange Key (KEK).
Futurex
SKI9000
External
Host
Generate Key
Exchange Key (KEK)
Export KEK
Components*
*If desired, the generation and export of KEK components may also be performed
on the SKI9000 and imported into the external host instead. This functionality
requires the SKI9000 Key Generation Add-On Module.
Insert KEK via
Hosts/Networks Menu
Translate Base Derivation Keys
(BDK) to Encryption Under KEK
Export Key
Cryptograms
Import Key
Cryptograms
Contact Us
Visit http://www.futurex.com
for more information
Greg Stone
Sr. Product Marketing Engineer, Enterprise Sales and Virtual Markets
Direct: +1 830-980-9782 x1316
Mobile: +1 210-287-2729
gstone@futurex.com

More Related Content

What's hot (20)

PDF
Developing MIPS Exploits to Hack Routers
BGA Cyber Security
 
PPTX
Password craking techniques
أحلام انصارى
 
PDF
MacOS memory allocator (libmalloc) Exploitation - Chinese Version
Angel Boy
 
PDF
Wireless Deauth and Disassociation Attacks explained
David Sweigert
 
PDF
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
PDF
TDOH x 台科 pwn課程
Weber Tsai
 
PPTX
Introduction to Public Key Infrastructure
Theo Gravity
 
PDF
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
 
PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PPTX
NMAP
PrateekAryan1
 
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
n|u - The Open Security Community
 
PPTX
Windows privilege escalation by Dhruv Shah
OWASP Delhi
 
PPSX
Secure electronic transaction
Nishant Pahad
 
PPTX
Key management
Brandon Byungyong Jo
 
PPTX
RSA algorithm
Arpana shree
 
PDF
台科大網路鑑識課程 封包分析及中繼站追蹤
jack51706
 
PDF
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Edureka!
 
PPTX
public key infrastructure
vimal kumar
 
Developing MIPS Exploits to Hack Routers
BGA Cyber Security
 
Password craking techniques
أحلام انصارى
 
MacOS memory allocator (libmalloc) Exploitation - Chinese Version
Angel Boy
 
Wireless Deauth and Disassociation Attacks explained
David Sweigert
 
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
TDOH x 台科 pwn課程
Weber Tsai
 
Introduction to Public Key Infrastructure
Theo Gravity
 
Elliptic Curve Cryptography for those who are afraid of maths
Martijn Grooten
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
n|u - The Open Security Community
 
Windows privilege escalation by Dhruv Shah
OWASP Delhi
 
Secure electronic transaction
Nishant Pahad
 
Key management
Brandon Byungyong Jo
 
RSA algorithm
Arpana shree
 
台科大網路鑑識課程 封包分析及中繼站追蹤
jack51706
 
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Edureka!
 
public key infrastructure
vimal kumar
 

Viewers also liked (20)

PPTX
RBMovil Powered by CHARGE Anywhere: MWC
CHARGE Anywhere
 
ODP
Snort
Michael Boman
 
DOCX
Intrusion Detection System
Devil's Cafe
 
PPTX
Key management and distribution
Riya Choudhary
 
PPTX
Snort ppt
aAlcantar93
 
PPT
Anton Chuvakin on Honeypots
Anton Chuvakin
 
PDF
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
PPT
Wireshark Basics
Yoram Orzach
 
PDF
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
PPTX
Intrusion Prevention System
Vishwanath Badiger
 
PPTX
Improving intrusion detection system by honeypot
mmubashirkhan
 
PPTX
Computer and Network Security
primeteacher32
 
PPTX
Snort IDS/IPS Basics
Mahendra Pratap Singh
 
PPTX
Industrial Training - Network Intrusion Detection System Using Snort
Disha Bedi
 
PPT
Network Intrusion Detection System Using Snort
Disha Bedi
 
PPTX
Wireshark
Sourav Roy
 
PPTX
Intrusion Detection System(IDS)
shraddha_b
 
PPTX
Intrusion detection system
Aparna Bhadran
 
PPTX
Intrusion detection
Umesh Dhital
 
RBMovil Powered by CHARGE Anywhere: MWC
CHARGE Anywhere
 
Intrusion Detection System
Devil's Cafe
 
Key management and distribution
Riya Choudhary
 
Snort ppt
aAlcantar93
 
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Database Firewall with Snort
Narudom Roongsiriwong, CISSP
 
Wireshark Basics
Yoram Orzach
 
Essential Guide to Protect Your Data [Key Management Techniques]
SISA Information Security Pvt.Ltd
 
Intrusion Prevention System
Vishwanath Badiger
 
Improving intrusion detection system by honeypot
mmubashirkhan
 
Computer and Network Security
primeteacher32
 
Snort IDS/IPS Basics
Mahendra Pratap Singh
 
Industrial Training - Network Intrusion Detection System Using Snort
Disha Bedi
 
Network Intrusion Detection System Using Snort
Disha Bedi
 
Wireshark
Sourav Roy
 
Intrusion Detection System(IDS)
shraddha_b
 
Intrusion detection system
Aparna Bhadran
 
Intrusion detection
Umesh Dhital
 
Ad

Recently uploaded (20)

PPTX
Q2 Leading a Tableau User Group - Onboarding
lward7
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Learn Computer Forensics, Second Edition
AnuraShantha7
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Q2 Leading a Tableau User Group - Onboarding
lward7
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Learn Computer Forensics, Second Edition
AnuraShantha7
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Ad

Futurex Secure Key Injection Solution

  • 2. Agenda • About Futurex • SKI Series Overview • Security Features • Regulatory Compliance • DUKPT Key Injection Overview • Contact Details
  • 3. Futurex. An Innovative Leader in Encryption Solutions. • For over 30 years, more than 15,000 customers worldwide have trusted Futurex solutions to protect their highly sensitive data • Hardware-based solutions with diverse applications in electronic payments and general-purpose data security • Entrepreneurial culture, fostering agility and innovation in the development of hardware encryption solutions with cross- platform, multidimensional applications • Results-oriented engineering team based entirely out of our U.S. Technology Campus, with significant experience delivering First-to-Market Customer Initiatives
  • 4. SKI Series – Secure Key Injection Futurex SKI Series ATM PIN Pads Key Comp 2 Point of Sale Terminals Secure Injection Facility Cost Effective •Inject up to sixteen POS terminals or ATM PIN pads at a time •Graphical user interface reduces training and administration costs Versatile •Supports most major terminal manufacturers and most key types, including Master/Session and 3DES DUKPT •Provides detailed audit records and the ability to generate key reports Key Comp 1
  • 5. Why Did Futurex Develop the SKI Series? • Adoption of ASC X9.24 - Part 1, which mandates the use of hardware-based encryption devices, by the major card brands has made it no longer acceptable to use software-based encryption to protect payment keys. • Existing key injection solutions are limited in capability and are outdated, often lacking support for multiple terminal manufacturers and a graphical user interface. • Storing keys as cryptograms or in a Tamper-Resistant Security Module (TRSM) dramatically reduces the risk of key exposure. • As key usage expands, the complexity of managing and tracking keys increases.
  • 6. SKI Series Features • Eliminates the costly manual process of loading multiple keys • Supports all major key types • Prints labels with device ID and key serial number for convenient tracking • Scalable to perform up to sixteen injections at once • Easy-to-use GUI significantly reduces training and administration costs • Keys exportable to the Futurex RKMS Series Remote Key Management Server
  • 7. Security Features Physical Security • Two independent front panel locks protected by individual barrel keys that are highly resistant to picking and/or duplication • CD-ROM drive hidden behind front panel • “Puzzle Box” design with hardened steel casing and interlocking components • TRSM with epoxy barrier and sensor wires to protect processor and system memory • Serial ports connected directly to TRSM Logical Security • Dual logins required to access application • User group permissions control privileges within application • Keys stored as cryptograms under MFK or KEK • Key component entry occurs in separate steps, each with individual check digit display • Complete, authenticated audit log files of all activity and access • Standard reports and customizable queries from audit log files
  • 8. Additional Features and Benefits Feature Benefit Supports easy, compliant direct key loading into POS terminals - Provides flexibility in key loading operations - Reduces training for key loaders - Reduces errors and re-work Loads keys directly from a FIPS 140-2 Level 3-certified Tamper Resistant Security Module (TRSM) - Meets new industry requirements for secure key injection - Improves the security of your online transactions POS terminal keys to be injected can be stored on the hard drive as cryptograms - It is not necessary to re-enter the key for each injection, dramatically improving total injection speed Detailed audit records and ability to easily generate reports from these records - Ability to easily manage internal and external TR-39 audits Easy to use Graphical User Interface (GUI) - Reduces training requirements for key loaders - Reduces errors and re-work
  • 9. Regulatory Compliance – Secure Room • Required for any organization that must undergo a TR-39 audit • Secure room requirements: o Mandatory dual access o No connection to outside networks o Auditable use and visitor logs o Access restricted to authorized personnel • How does the secure room apply to Point of Sale terminal manufacturers? o Clear keys must be loaded within a secure room o Certificate authorities must be generated, stored, and managed within a secure room • Futurex’s CTGA-certified Solutions Architects have secure room expertise and can provide training assistance in the design and implementation process
  • 10. Overview – DUKPT Key Injection
  • 11. DUKPT Features • DUKPT (Derived Unique Key Per Transaction) ensures that a different key is used for every transaction • A DUKPT key consists of two parts: – BDK (Base Derivation Key), the working key that is used for encryption – KSN (Key Serial Number), the unique serial number that is injected into each device • After every transaction, a new DUKPT key is derived from the incremented KSN which is used to encrypt the PIN SKI Series Point of Sale Terminals Secure Injection Facility BDK KSN
  • 12. Overview – DUKPT Key Injection SKI Series POS Terminal Secure Room The SKI Series is fully compliant with the Triple-DES DUKPT standard and is capable of automatically deriving unique IDs for each terminal injected. This is designed to maintain high injection throughput and requires an absolute minimum of configuration and input from key officers Key Comp(BDK) 2 Key Comp(BDK) 1 KSN Point of Sale Host/Bank Excrypt™ SSP Series Hardware Security Module (HSM)
  • 13. Key Serial Number • The Key Serial Number (KSN) is the unique serial number that is injected into each POS terminal • The KSN consists of five parts concatenated together – Issuer Identification Number • Unique per issuer – Customer ID Number – Group Identifier Number – Unique Device ID • Incremented after every device injection – Transaction Counter • Incremented after every transaction • The KSN ensures that all transactions use a unique key which has been derived from the original BDK
  • 14. Overview – DUKPT Key Injection SKI Series POS Terminal Secure Room From within a secure room or facility, the Base Derivation Key (BDK) and Key Serial Number (KSN) are loaded onto the SKI Series. To ease the process of loading multiple keys on multiple different terminals, the device is designed with a cryptogram export and import feature. Key Comp(BDK) 2 Key Comp(BDK) 1 KSN Once the BDK and the KSN have both been loaded, the POS terminal can be injected via the point-and-click GUI. The KSN will also increment automatically when keys are shared between multiple terminal types. KSN Components Bit Range Byte Range ID Definition 1-24 1-3 IIN Issuer Identifier Number 25-32 4 CID Customer ID Number 32-40 5 GID Group Identifier Number 41-59 6-~8 DID Unique Device ID 60-80 ~8-10 TC Transaction Counter
  • 15. Overview – DUKPT Key Injection Once injected, the POS terminals can be instantly deployed into a production environment. The KSN will automatically increment after each transaction, ensuring compliance with the ANSI X9.24 regulations requiring the use of DUKPT. Point of Sale Host/Bank Excrypt™ SSP Series Hardware Security Module (HSM) Host Database
  • 16. Futurex SKI9000 – Key Exchange Process Flow Diagram This procedure outlines the process by which users may export keys from an external host and import them into the SKI9000, encrypted under a mutually-shared Key Exchange Key (KEK). Futurex SKI9000 External Host Generate Key Exchange Key (KEK) Export KEK Components* *If desired, the generation and export of KEK components may also be performed on the SKI9000 and imported into the external host instead. This functionality requires the SKI9000 Key Generation Add-On Module. Insert KEK via Hosts/Networks Menu Translate Base Derivation Keys (BDK) to Encryption Under KEK Export Key Cryptograms Import Key Cryptograms
  • 17. Contact Us Visit http://www.futurex.com for more information Greg Stone Sr. Product Marketing Engineer, Enterprise Sales and Virtual Markets Direct: +1 830-980-9782 x1316 Mobile: +1 210-287-2729 [email protected]