PIN Security Requirements:
20-1 POI devices must implement unique secret and private keys for any function directly or indirectly related to PIN protection. These keys must be known only in that device and in hardware security modules (HSMs) at the minimum number of facilities consistent with effective system operations.
Disclosure of the key in one such device must not provide any information that could be feasibly used to determine the key in any other such device.
This means that not only the PIN-encryption key(s), but also keys that are used to protect other keys, firmware-authentication keys, payment application authentication, and display-prompt control keys. As stated in the requirement, this does not apply to public keys resident in the device.
POI private keys must not exist anywhere but the specific POI they belong to, except where generated external to the POI and prior to the injection into the POI.
Testing Procedures:
20-1.a Examine documented procedures for the generation, loading, and usage of all keys used in transaction-originating POI devices. Verify the procedures ensure that all private and secret keys used in transaction-originating POI devices are:
- Known only to a single POI device, and
- Known only to HSMs at the minimum number of facilities consistent with effective system operations.
20-1.b Observe HSM functions and procedures for generating and loading secret and private keys for use in transaction-originating POIs to verify that unique keys are generated and used for each POI device.
20-1.c Examine check values, hashes, or fingerprint values for a sample of cryptographic keys from different POI devices to verify private and secret keys are unique for each POI device. This can include comparing a sample of POI public keys (multiple devices for each POI vendor used) to determine that the associated private keys stored in the POI devices are unique per device—i.e., the public keys are unique.