background image

5 - Security 

DynaFlex II Go| Secure Card Reader | PCI PTS POI v6.2 Security Policy 

 

Page 16 of 18 (

D998200596-100

5

 

Security 

5.1

 

Account Data Protection 

The device always encrypts account data from all three reader types using 112-bit TDEA, 128-bit AES, or 
256-bit AES algorithms with X9.24 DUKPT key management. This device does not support any 
mechanisms such as whitelists or SRED disable that would allow the data to be sent out unencrypted. 

5.2

 

Algorithms Supported 

The device includes the following cryptographic algorithms: 

 

AES 

 

TDEA 

 

RSA 

 

ECDSA (P256 and P521 curves) 

 

SHA-256 

5.3

 

Key Management 

The device implements the original AES/TDEA DUKPT as its only key management method.  Use of any 
other method will invalidate PCI approval.  DUKPT derives a new unique key for every transaction.  For 
more details, see 

ANS X9.24 Part 3:2017

Table 5-1 - DynaFlex II Go Product Keys 

Key Name 

Size 

Algorithm 

Purpose 

Transport Keys 

32 bytes 

AES X9.143 KBPKs 

Key Injection 

Account Data Key 

16 bytes for TDEA and 
AES-128 
 
32 bytes for AES-256 

AES and TDEA DUKPT 
(ANS X9.24-3) 

Encrypt and MAC 
Account Data 

Firmware Protection Key 

64 bytes for 
ECDSA Curve P-256 

ECDSA and SHA-256 

Checks integrity 
and authenticity of 
firmware 

EMV CA Public keys 

Varies per issuer 

RSA 

Authenticate card 
data and keys 

5.4

 

Key Loading 

The device does not support manual or plaintext cryptographic key entry.  Only specialized tools, 
compliant with key management requirements and cryptographic methods, specifically 

ANSI X9.143

, can 

be used for key loading. Use of any other methods will invalidate PCI approval. 

5.5

 

Key Replacement 

Keys should be replaced with new keys whenever the original key is known or suspected to have been 
compromised, and whenever the time deemed feasible to determine the key by exhaustive attack has 
elapsed, as defined in 

NIST SP 800-57-1

 

 

Summary of Contents for DynaFlex II Go

Page 1: ...Seal Beach CA 90740 I Phone 562 546 6400 I Technical Support 562 415 6800 www magtek com DynaFlex II Go Secure Card Reader PCI PTS POI v6 2 Security Policy October 2023 Document Number D998200596 100...

Page 2: ...Tap Go are trademarks of MasterCard International Incorporated Visa and Visa payWave are registered trademarks of Visa International Service Association ANSI the ANSI logo and numerous other identifi...

Page 3: ...DynaFlex II Go Secure Card Reader PCI PTS POI v6 2 Security Policy Page 3 of 18 D998200596 100 Table 0 1 Revisions Rev Number Date Notes 100 October 25 2023 Initial Release...

Page 4: ...dance 11 3 1 Initial Inspection 11 3 2 Installation 11 3 3 Environmental Conditions 11 3 4 Communications and Security Protocols 12 3 5 Configuration Settings 12 4 Operation and Maintenance 13 4 1 Per...

Page 5: ...ent responsibilities administrative responsibilities device functionality identification and environmental requirements The use of this secure card reader in any method not described in this security...

Page 6: ...cription 2 1 Product Name and Appearance The front view of all DynaFlex II Go models with and without BCR are shown in Figure 2 1 below The back view of all DynaFlex II Go devices are identical as see...

Page 7: ...arcode reader BCR and Bluetooth LE connectivity DynaFlex II Go models can be used as desktop or handheld devices They are approved as a secure card reader SCR under PCI PTS POI v6 2 requirements Usage...

Page 8: ...oth LE Device Label The label also contains other supporting information about the device All DynaFlex II Go product family hardware configurations are listed in Table 2 1 below The device utilizes tw...

Page 9: ...B B 0 4 2 P C I 5 0 B 0 B B 0 Fixed Position Variable X Position Description of Fixed or Variable X in the Selection Position 1 2 42 DynaFlex II Go 3 5 PCI PCI Hardware 6 Front options 3 Standard 5 i...

Page 10: ...itial bootloader Boot0 permanently programmed into the device Any changes to either Boot0 or Boot1 will result in a change to the Boot1 FW version that is visible to the user reported by the device an...

Page 11: ...h device See section 4 1 Periodic Inspection for more information regarding visual inspection of the device 5 Follow the steps in section 2 3 2 to view the PCI firmware versions installed on the devic...

Page 12: ...ol and a Bluetooth LE interface Transactions configuration firmware updates and key injection can all be performed using these interface types Use of any method not listed in this security policy will...

Page 13: ...e runs well as the startup will inspect the hardware security authenticity and integrity of firmware Only the leftmost LED should be on and blinking green Figure 4 1 Chip Card Insertion Slot and Swipe...

Page 14: ...lity that gives access to security sensitive services based on roles Such services are managed through dedicated tools using cryptographic authentication 4 4 Passwords and Certificates DynaFlex II Go...

Page 15: ...by using update tools available from the MagTek web site The device verifies each update is newer than the installed version and cryptographically authenticates the file If version checking or authent...

Page 16: ...9 24 Part 3 2017 Table 5 1 DynaFlex II Go Product Keys Key Name Size Algorithm Purpose Transport Keys 32 bytes AES X9 143 KBPKs Key Injection Account Data Key 16 bytes for TDEA and AES 128 32 bytes fo...

Page 17: ...saction ECC Elliptic Curve Cryptography ICCR Integrated Circuit Card Reader MAC In cryptography Message Authentication Code In networking Media Access Control address MSR Magnetic Stripe Reader NFC Ne...

Page 18: ...lation and Operation Manual D998200597 DynaFlex II Go Programmer s Manual COMMANDS D998200593 DynaFlex II Go Device Inspection Document D998200594 DynaFlex II Go Package Inspection Document NIST SP 80...

Reviews: