Recent from talks
Nothing was collected or created yet.
Card security code
View on Wikipedia


A card security code (CSC; also known as CVC, CVV, or several other names) is a series of numbers that, in addition to the bank card number, is printed (but not embossed) on a credit or debit card. The CSC is used as a security feature for card-not-present transactions, where a personal identification number (PIN) cannot be manually entered by the cardholder (as they would during point-of-sale or card present transactions). It was instituted to reduce the incidence of credit card fraud. Unlike the card number, the CSC is deliberately not embossed, so that it is not read when using a mechanical credit card imprinter which will only pick up embossed numbers.
These codes are in slightly different places for different card issuers. The CSC for Visa, Mastercard, and Discover credit cards is a three-digit number on the back of the card, to the right of the signature box. The CSC for American Express is a four-digit code on the front of the card above the account number. See the figures to the right for examples.
CSC was originally developed in the UK as an eleven-character alphanumeric code by Equifax employee Michael Stone in 1995. After testing with the Littlewoods Home Shopping group and NatWest bank, the concept was adopted by the UK Association for Payment Clearing Services (APACS) and streamlined to the three-digit code known today. Mastercard started issuing CVC2 numbers in 1997 and Visa in the United States issued them by 2001. American Express started to use the CSC in 1999, in response to growing Internet transactions and card member complaints of spending interruptions when the security of a card has been brought into question.
Contactless card and chip cards may electronically generate their own code, such as iCVV or a dynamic CVV.366
Naming
[edit]The codes have different names:
- "CSC" or "card security code": debit cards,[which?] American Express (three digits on back of card, also referred to as 3CSC)[1]
- "CVC" or "card validation code": Mastercard
- "CVV" or "card verification value": Visa
- "CAV" or "card authentication value": JCB
- "CID": "card ID", "card identification number", or "card identification code": Discover, American Express (four digits on front of card). American Express usually uses the four-digit code on the front of the card, referred to as the card identification code (CID), but also has a three-digit code on the back of the card, referred to as the card security code (CSC). American Express also sometimes refers to a "unique card code".[2]
- "CVD" or "card verification data": Discover
- "CVE" or "Elo verification code": Elo in Brazil
- "CVN" or "card validation number", also "card verification number": China UnionPay, Google Ads[3]
- "SPC" or "signature panel code"[4]
- "CCV" or "card code verification": commonly used in Canada
Types
[edit]There are several types of security codes and PVV (all generated from DES key in the bank in HSM modules using PAN, expiration date and service code):
- The first code, 3 numbers, called CVC1 or CVV1, is encoded on track one and two of the magnetic stripe of the card and used for card present transactions, with signature (second track also contains pin verification value, PVV, but now it is usually all zeroed out and service code). The purpose of the code is to verify that a payment card is actually in the hand of the merchant (thus it should be different from CVV2). This code is automatically retrieved when the magnetic stripe of a card is read (swiped) on a point-of-sale (card present) device and is verified by the issuer. A limitation is that if the entire card has been duplicated and the magnetic stripe copied, then the code is still valid, notwithstanding the fact that cardholder signature will still usually be required .
- The second code, and the most cited, is CVV2 or CVC2. This code is often used by merchants for card-not-present transactions including online purchases. In some countries in Western Europe, card issuers require a merchant to obtain the code when the cardholder is not present in person. Uses service code 000.
- Contactless and/or chip EMV cards supply their own electronically generated codes, called iCVV. Uses service code 999. It is described in public standards from EMVCo.
- Consumer Device Cardholder Verification Method (CDCVM for short) is a type of identity verification in which the user's mobile device (such as a smartphone) is used to verify the user's identity; for example, it can use the device's biometrics authentication features (e.g. Touch ID or Face ID), or the device's set passcode. It is supported by a number of payment systems, such as Apple Pay,[5] Google Pay[6] or Samsung Pay.[7]
Location
[edit]
The card security code is typically the last three or four digits printed, not embossed like the card number, on the signature strip on the back of the card. On American Express cards, however, the card security code is the four digits printed (not embossed) on the front towards the right. The card security code is not encoded on the magnetic stripe but is printed flat.
- American Express cards have a four-digit code printed on the front side of the card above the number.
- Diners Club, Discover, JCB, Mastercard, and Visa credit and debit cards have a three-digit card security code. The code is the final group of numbers printed on the back signature panel of the card.
- New North American Mastercard and Visa cards feature the code in a separate panel to the right of the signature strip.[8] This has been done to prevent overwriting of the numbers by signing the card.
Generation
[edit]The CSC for each card (form 1 and 2) is generated by the card issuer when the card is issued. It is calculated by encrypting the bank card number and expiration date (two fields printed on the card) with encryption keys known only to the card issuer, and decimalising the result (in a similar manner to a hash function).[9][10][11]
Benefits and limitations
[edit]This section contains a pro and con list. (May 2021) |
As a security measure, merchants who require the CVV2 for card-not-present transactions are required by the card issuer not to store the CVV2 once the individual transaction is authorized.[12] This way, if a database of transactions is compromised, the CVV2 is not present and the stolen card numbers are less useful. Virtual terminals and payment gateways do not store the CVV2 code; therefore, employees and customer service representatives with access to these web-based payment interfaces, who otherwise have access to complete card numbers, expiration dates, and other information, still lack the CVV2 code.
The Payment Card Industry Data Security Standard (PCI DSS) also prohibits the storage of CSC (and other sensitive authorisation data) post transaction authorisation. This applies globally to anyone who stores, processes or transmits cardholder data.[13] Since the CSC is not contained on the magnetic stripe of the card, it is not typically included in the transaction when the card is used face to face at a merchant. However, some merchants in North America, such as Sears and Staples, require the code. For American Express cards, this has been an invariable practice (for card-not-present transactions) in European Union (EU) countries like Ireland and the United Kingdom since the start of 2005. This provides a level of protection to the bank/cardholder, in that a fraudulent merchant or employee cannot simply capture the magnetic stripe details of a card and use them later for card-not-present transactions over the phone, mail order or Internet. To do this, a merchant or its employee would also have to note the CVV2 visually and record it, which is more likely to arouse the cardholder's suspicion.
Supplying the CSC code in a transaction is intended to verify that the customer has the card in their possession. Knowledge of the code proves that the customer has seen the card, or has seen a record made by somebody who saw the card.
Limitations include:
- The use of the CSC cannot protect against phishing scams, where the cardholder is tricked into entering the CSC among other card details via a fraudulent website. The growth in phishing has reduced the real-world effectiveness of the CSC as an anti-fraud device. There is now also a scam where a phisher has already obtained the card account number (perhaps by hacking a merchant database or from a poorly designed receipt) and gives this information to the victims (lulling them into a false sense of security) before asking for the CSC (which is all that the phisher needs and the purpose of the scam in the first place).[14]
- Since the CSC may not be stored by the merchant for any length of time[12] (after the original transaction in which the CSC was quoted and then authorized), a merchant who needs to regularly bill a card for a regular subscription would not be able to provide the code after the initial transaction. Payment gateways, however, have responded by adding "periodic bill" features as part of the authorization process.
- Some card issuers do not use the CSC. However, transactions without CSC are possibly subjected to higher card processing cost to the merchants,[citation needed] and fraudulent transactions without CSC are more likely to be resolved in favour of the cardholder.[citation needed]
- It is not mandatory for a merchant to require the security code for making a transaction, so the card may still be prone to fraud even if only its number is known to phishers. For example, Amazon requires only a card number and expiration date to complete a transaction.
- It is possible for a fraudster to guess the CSC by using a distributed attack.[15]
See also
[edit]References
[edit]- ^ "SafeKey Frequently Asked Questions | American Express Canada". www.americanexpress.com. Retrieved 4 May 2021.
- ^ "American Express® Card security features" (PDF). www.americanexpress.com. Archived (PDF) from the original on 27 November 2020. Retrieved 4 May 2021.
- ^ "Card verification number (CVN)". Retrieved 2 July 2023.
- ^ "CIBC MasterCard - MasterCard SecureCode". Archived from the original on 24 April 2014. Retrieved 12 July 2012.
- ^ "Apple Pay £20 limit in the UK will 'change over time'". Wired UK. 24 June 2015. Retrieved 24 June 2022.
- ^ "Breakthrough for mobile payments? Google Pay launched in Germany". Avira. 17 July 2018. Retrieved 24 June 2022.
- ^ "Samsung Pay now allows Australian users to make high-value purchases without PIN". SamMobile. 22 September 2020. Retrieved 24 June 2022.
- ^ "Card Security Features" (PDF). Visa. Archived from the original (PDF) on 16 February 2012.
- ^ "VISA PIN Algorithms". www.ibm.com. 18 September 2012. Retrieved 18 June 2021.
- ^ "z/OS Integrated Cryptographic Service Facility Application Programmer's Guide". IBM. March 2002. p. 209. Archived from the original on 13 July 2012.
- ^ "z/OS Integrated Cryptographic Service Facility Application Programmer's Guide". IBM. March 2002. p. 258. Archived from the original on 17 July 2012.
- ^ a b "Rules for Visa Merchants". p. 1. Archived from the original (doc) on 24 February 2014. Retrieved 26 February 2013.
- ^ "Official Source of PCI DSS Data Security Standards Documents and Payment Card Compliance Guidelines". Pcisecuritystandards.org. Retrieved 25 December 2011.
- ^ "Urban Legends Reference Pages: Visa Fraud Investigation Scam". Snopes.com. 23 December 2003. Retrieved 25 December 2011.
- ^ Ducklin, Paul (5 December 2016). "How to guess credit card security codes". naked security by SOPHOS. Archived from the original on 6 December 2016. Retrieved 8 December 2016.
Card security code
View on GrokipediaHistory and Development
Origins
In the early 1990s, the United Kingdom experienced a significant surge in credit card fraud, particularly in card-not-present transactions such as mail-order and telephone sales, which lacked the physical verification of in-person purchases. This period predated the widespread adoption of the internet for commerce, making remote transactions vulnerable to stolen card details obtained through theft or social engineering. Fraud losses from credit cards in the UK escalated rapidly, rising from £122 million in 1997 to £293 million by 2000, prompting urgent calls for enhanced security measures within the payment industry.[11] To address this growing threat, UK-based Equifax engineer Michael Stone invented the card security code in 1995 specifically to combat mail-order fraud. Stone's initial proposal featured an 11-character alphanumeric code printed on the card's signature strip, designed to verify the cardholder's possession of the physical card during remote transactions without requiring additional equipment. This innovation aimed to add a layer of authentication that fraudsters could not easily replicate if they only had the card number and expiration date.[7][12] Following early testing, the concept received endorsement from the UK Association for Payment Clearing Services (APACS) in 1996, which streamlined the code to a simpler three-digit numeric format for practicality and ease of implementation. This refinement facilitated broader testing among UK issuers and merchants, laying the groundwork for its eventual global adoption by major card networks.[7]Adoption by Major Networks
Mastercard was the first major card network to adopt a card security code, introducing the Card Validation Code (CVC) in 1997 following initial trials in the United Kingdom. This three-digit code, printed on the signature strip of the card, was mandated for all Mastercard credit and debit cards by January 1, 1997, to verify card possession during non-face-to-face transactions and combat rising fraud in early e-commerce.[13][14] American Express followed in 1999 by implementing its four-digit Card Identification Number (CID), positioned on the front of the card above the account number, to provide an additional layer of validation for mail-order and online purchases. Visa joined later, rolling out the Card Verification Value 2 (CVV2) in 2001 across the United States, building on ongoing industry discussions around EMV chip technology standards that emphasized enhanced authentication for remote transactions. This implementation required all Visa cards to include the CVV2 by January 1, 2001, aligning with the growing need for secure online payments.[15][16][14] The adoption of these security codes expanded rapidly to international markets during the 2000s, particularly in Europe where e-commerce growth accelerated alongside the rollout of chip-and-PIN systems, reducing card-not-present fraud through mandatory code verification at merchants. In the United States, widespread implementation occurred by the mid-2000s, driven by surging online retail volumes that necessitated robust fraud prevention measures beyond magnetic stripe data. A pivotal development came in 2004 with the launch of the Payment Card Industry Data Security Standard (PCI DSS) by major networks including Visa, Mastercard, and American Express, which integrated security code requirements into global compliance frameworks, mandating their use in authorization requests while prohibiting post-authorization storage to minimize data breach risks.[17][18] By the 2010s, as EMV chip cards gained traction worldwide—with 14.7 billion issued globally as of 2024—the static security codes evolved to support chip-based environments through dynamic variants like integrated CVVs (iCVV), which generate transaction-specific codes to further secure both contact and contactless payments while maintaining compatibility for card-not-present scenarios. This shift complemented the core PCI DSS guidelines, enhancing overall network resilience against evolving threats.[19][20]Naming and Terminology
Common Terms
The primary terms used in the payment card industry for the security code are Card Security Code (CSC), Card Verification Value (CVV), and Card Verification Code (CVC).[21][22] These acronyms refer to the same type of verification feature, a short numeric code printed on the card to authenticate transactions without physical card presence.[23] The term CVV originates from Visa's concept of a "verification value," a calculated code designed to confirm card authenticity during remote transactions, while CVC stems from Mastercard's designation of a "verification code" for similar purposes.[24][13] CSC serves as a more general industry term encompassing these and other variants.[21] In non-technical contexts, such as consumer education materials, the feature is commonly referred to simply as the "security code" to emphasize its role in fraud prevention without delving into brand-specific acronyms.[25][26] CVV is occasionally used generically for the security code across networks.[1]Variations by Issuer
Different card issuers and networks employ distinct terminology and minor format variations for their security codes, reflecting proprietary implementations while adhering to broader industry standards for fraud prevention. These differences primarily involve the acronym used and, in some cases, the number of digits, but the core purpose remains consistent across issuers.[21] Visa designates its three-digit security code as the Card Verification Value (CVV), printed on the back of the card.[27] Mastercard refers to its equivalent three-digit code as the Card Verification Code (CVC), also located on the back.[27] American Express uses a four-digit Card Identification Number (CID), uniquely positioned on the front of the card above the card number.[28] Discover employs the Card Identification Number (CID) for its three-digit code, similar in format to Visa and Mastercard but with issuer-specific branding.[29] In regional contexts, JCB cards in Japan utilize the Card Authentication Value (CAV), a three-digit code aligned with international norms but tailored for the network's authentication processes.[30] Some European issuers, particularly in payment processing for Visa and Mastercard transactions, refer to the code as a V-Code (verification code), emphasizing its role in transaction validation without altering the standard digit length.[31] These variations help issuers differentiate their systems while integrating with global payment networks.Types of Security Codes
Static Codes
Static codes, also known as CVV2 for Visa cards, CVC2 for Mastercard cards, and CID for Discover and American Express cards, are fixed three- or four-digit numerical values printed on the back or front of payment cards.[7] These codes are not encoded within the card's magnetic stripe, distinguishing them from earlier verification values used in physical transactions, and are generated at the time of card issuance to remain constant throughout the card's validity period.[32] For instance, a typical static code might appear as "123" on the signature panel of a Visa card, serving as a static identifier tied to the physical card.[33] The primary purpose of static codes is to enhance security in card-not-present (CNP) transactions, such as online, mail-order, or telephone purchases, where the merchant lacks physical access to the card.[7] By requiring the cardholder to provide this additional detail alongside the card number and expiration date, issuers can verify possession of the physical card, thereby reducing the risk of fraud from stolen card data alone.[1] This verification occurs when the code is transmitted to the issuer during authorization, confirming its match against the recorded value without revealing full card details to unauthorized parties.[34] In terms of format, static codes consist of three digits for Visa, Mastercard, and Discover cards, while American Express uses a four-digit code, often printed in a smaller font on the front of the card.[7] These specifications ensure uniformity across major networks, facilitating seamless integration into merchant systems for CNP verification.[35] Historically, static codes originated in the United Kingdom in 1995, developed by Michael Stone of Equifax and adopted by the Association for Payment Clearing Services (APACS), before gaining global traction.[7] Mastercard introduced CVC2 in 1997, followed by American Express and Visa in the United States by 2001, marking their widespread rollout to combat rising CNP fraud in the pre-chip era.[7] They remained the dominant security measure for CNP transactions from the early 2000s through the 2010s, particularly in regions slow to adopt EMV chip technology, such as the U.S., where chip migration only accelerated in the mid-2010s.[36] This period saw static codes integrated into virtually all e-commerce platforms, significantly curbing unauthorized use until dynamic alternatives began emerging.[7]Dynamic and Chip-Based Codes
Dynamic and chip-based security codes represent an evolution from static codes, integrating cryptographic processes within EMV-compliant chips to generate variable values per transaction, particularly for contactless payments. Unlike static codes printed on cards, these dynamic codes, such as the integrated Card Verification Value (iCVV), are produced on-the-fly by the card's embedded chip during interaction with a payment terminal. This approach leverages the EMV chip's secure element to create a unique, pseudo-random verification value based on transaction-specific data and cryptographic keys, ensuring that each code is valid only for that instance.[37][38] The iCVV is specifically designed for chip-present and contactless transactions under EMV standards, where the chip computes the value using advanced cryptography to authenticate the card and prevent unauthorized use of intercepted data. Introduced as part of EMVCo's specifications with enhancements in contactless protocols, this mechanism generates pseudo-random values that incorporate elements like the transaction counter and unpredictable numbers from the terminal, making replication difficult. In tokenization services, a similar dynamic Card Verification Value (dCVV) is employed; for example, Apple Pay uses a transaction-specific dynamic security code—a cryptogram generated by the device's secure element—while Google Pay incorporates a dynamically generated DCVV to replace the static CVV during mobile wallet transactions. These codes are validated by issuers in real-time, enhancing security for non-physical card interactions.[39][40][41] A key advantage of dynamic and chip-based codes over static ones is their ability to mitigate replay attacks, where fraudsters attempt to reuse captured transaction data, as the values change with each use and cannot be predictably duplicated without the chip's private keys. Payment networks have integrated these into authentication protocols; Visa's Visa Secure (EMV 3-D Secure) supports dynamic CVV generation for risk-based verification in card-not-present scenarios, while Mastercard's Identity Check employs similar dynamic elements to confirm cardholder authenticity during online transactions. By the 2020s, adoption has become widespread, with EMV chip technology underpinning over 95% of global card-present transactions as of 2024, including more than 90% contactless in Europe and substantial growth in the US exceeding 80% chip-based payments.[42][10][43][19]Physical Characteristics
Location on Cards
The card security code, also known as CVV or CVC, is typically located on the back of Visa, Mastercard, and Discover cards, positioned in the signature strip to the right of the printed card number.[44] This placement follows industry standards set by these major networks to ensure the code is not easily visible during physical transactions while remaining accessible for verification.[45] American Express cards present an exception, with the four-digit security code (CID) printed on the front of the card, usually above the card number on the right side.[2] This design choice aligns with American Express's unique card layout, where the full 16-digit account number appears on the front rather than the back.[2] Debit cards issued under Visa or Mastercard networks generally adhere to the same placement conventions as their credit card counterparts, with the code on the back in the signature area.[46] However, some prepaid debit cards may omit the printed code entirely or position it on the front, particularly if they are designed primarily for in-person use without support for online transactions.[47] Contactless cards, which incorporate EMV chips for tap-to-pay functionality, still feature the static security code printed in the standard locations to support card-not-present transactions, though the chip generates dynamic authentication data for physical contactless payments.[48] To enhance security and deter casual copying or skimming, the security code is always printed rather than embossed and uses a small, non-standardized font size that is difficult to read from a distance.[24]Appearance and Format
The card security code, also known as CVV, CVC, or CID depending on the issuer, is standardized in its numerical length to facilitate consistent verification processes. For Visa, Mastercard, and Discover cards, it consists of three digits, while American Express uses a four-digit CID.[49][28] These codes are printed using flat thermal or laser techniques directly on the card's surface or within the signature panel, ensuring legibility and resistance to wear. On modern Visa cards, particularly Quick Read designs, the code appears below the account number and expiration date in a tone-on-tone format for subtle integration with the card's artwork. Mastercard specifications similarly require flat printing in a color that provides sufficient contrast against the background, often in black or gray ink to match the overall card aesthetics.[50][51] Premium cards may incorporate advanced security printing elements, such as holographic overlays or micro-text integrated into the card's surface, to deter photocopying and counterfeiting attempts. These features shift appearance under light or magnification, adding a layer of visual verification.[52][53] The format adheres to strict rules for validation: the code comprises digits from 0 to 9, with no prohibition on leading zeros, allowing values like 012 or 000 in valid cases. It includes an embedded validation mechanism derived from the card's primary account number and service code, enabling basic integrity checks during transactions without revealing the full generation process.[54][55] Following the widespread adoption of EMV chip technology in the 2010s, card issuers shifted toward laser-etched printing for security codes on many plastic and premium metal cards, improving durability against abrasion and environmental damage compared to earlier embossed or ink-based methods. This evolution aligns with broader trends in flat card designs, where placement variations—such as within or outside the signature panel—maintain consistent formatting for readability.[56][50]Generation Process
Algorithm Fundamentals
The card security code is generated through a cryptographic process that primarily involves encrypting key card details to produce a short numeric value, typically 3 or 4 digits long. The core inputs include the primary account number (PAN), the card's expiration date (in YYMM format), and the service code (a 3-digit value indicating card usage permissions per ISO/IEC 7813). This data is concatenated and encrypted using the Data Encryption Standard (DES) or, more commonly in modern implementations, Triple DES (3DES) with a double-length key known as the Card Verification Key (CVK).[57][58] The resulting ciphertext is then truncated or processed to yield the final code, ensuring it verifies the authenticity of the card details without exposing sensitive information.[55] A critical component of the generation is the use of issuer master keys to derive the CVK, which is combined with the card-specific data for uniqueness. The master key, often a double-length 3DES key (16 bytes), is used to perform the encryption in a way that ties the code exclusively to the individual card instance. This derivation prevents the code from being reproducible without access to the issuer's cryptographic infrastructure, as the CVK is not stored on the card itself. The process incorporates a checksum element, functioning as a proprietary validation digit that confirms the integrity of the encrypted output, akin to but distinct from standard check digit methods like the Luhn algorithm used for the PAN.[57][55] The fundamental algorithm can be represented in simplified pseudo-code as follows, where the encryption yields an 8-byte output from which the last 3 decimal digits are extracted:Input: PAN (rightmost digits, padded), Expiry (YYMM), Service Code (3 digits)
Data = Concatenate(PAN + Expiry + Service Code), padded to 16 hex bytes
Key1 = Left 8 bytes of CVK
Key2 = Right 8 bytes of CVK
Temp1 = DES_Encrypt(Data[1-8], Key1)
Temp2 = XOR(Temp1, Data[9-16])
Temp3 = DES_Encrypt(Temp2, Key1)
Temp4 = DES_Decrypt(Temp3, Key2)
CVV_Output = DES_Encrypt(Temp4, Key1)
CVV = Decimal of rightmost 3 digits of CVV_Output (mod 1000)
Input: PAN (rightmost digits, padded), Expiry (YYMM), Service Code (3 digits)
Data = Concatenate(PAN + Expiry + Service Code), padded to 16 hex bytes
Key1 = Left 8 bytes of CVK
Key2 = Right 8 bytes of CVK
Temp1 = DES_Encrypt(Data[1-8], Key1)
Temp2 = XOR(Temp1, Data[9-16])
Temp3 = DES_Encrypt(Temp2, Key1)
Temp4 = DES_Decrypt(Temp3, Key2)
CVV_Output = DES_Encrypt(Temp4, Key1)
CVV = Decimal of rightmost 3 digits of CVV_Output (mod 1000)
