Testing in General | Code Magus Limited

Software testing, data communications, problem and performance analysis, technical development.

Testing in General

The CML Tools support many security mechanisms including all standard clear password schemes, NTLM; Entersekt (www.entersekt.com), Kerberos, HTTPS, server/client certificates, customer proprietary schemes and one time passwords through mobile networks (part of the internet and retail banking security schemes).

The Thistle Type A Interface cryptotai is an interface which exposes routines to perform key based encryption and decryption using the DES ecb3 routines provided by OpenSSL. It also exposes routines to perform key management for BICISO, as well as, providing all routines necessary to implement Derived Unique Key Per Transaction (DUKPT) from American National Standard for Financial Services ANS X9.24-2002. Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques.

They also support many card related security schemes such as Data Encryption Standard (DES), triple DES, Derived Unique Key Per Transaction (DUKPT)[1], Card Verification Value (CVV/CVV1), Card verification Code (CVC/CVC1), Card Security Code (CSC/CSC3/CSC4/CSC4), Chip and PIN cards [2] (including EMV [3]: Europay, MasterCard and Visa) using Authorisation Request Cryptogram (ARQC)/authorisation response cryptogram (ARPC) / Transaction certificate (TC)/Application Authentication Cryptogram (AAC).

Meta-data or content may be described by many schemes and representations such as proprietary fixed format, card association formats [3], industry associations for example International Air Transport Association (IATA), XSD/XML, WSDL/XML, ASN.1/BER, etc.

For proprietary and standard applications the CML Tools can support any transport layer protocol including; X.25, XOT, SSL, TCP/IP, MQ/MQSI, HTTP (web-server and web-services), HTTPS (web-server and web-services), SMS, USSD, USSD-NI.
This enables CML to:

  • monitor, measure, report and secure POS and ATM traffic
  • With the use of the cryptographic modules, provide services that are capable to support PIN and card data encryption
  • Migrate from packet networks to TCP/IP, through seamless replacements for X.25.