World Library  
Flag as Inappropriate
Email this Article

Personal identification number

Article Id: WHEBN0000337220
Reproduction Date:

Title: Personal identification number  
Author: World Heritage Encyclopedia
Language: English
Subject: Shoulder surfing (computer security), Automated teller machine, Scratchcard, Interac, Security of automated teller machines
Collection: Banking Terms, Password Authentication, Personal Identification Documents
Publisher: World Heritage Encyclopedia

Personal identification number

Personal identification number shown in a PIN mailer

A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is a numeric password shared between a user and a system, that can be used to authenticate the user to the system. Typically, the user is required to provide a non-confidential user identifier or token (the user ID) and a confidential PIN to gain access to the system. Upon receiving the user ID and PIN, the system looks up the PIN based upon the user ID and compares the looked-up PIN with the received PIN. The user is granted access only when the number entered matches with the number stored in the system. Hence, despite the name, a PIN does not personally identify the user.[1]

PINs are used with banking systems (where the identifying token is a card), but are also used in other, non-financial systems.

The PIN is not printed or embedded on the card but is manually entered by the cardholder during automated teller machine (ATM) and point of sale (POS) transactions (such as those that comply with EMV), and in card not present transactions, such as over the Internet or for phone banking.

PINs may also be used in contexts other than ATM or POS transactions, such as door access, Internet transactions, or to log in to a restricted website. In such cases, the PIN may simply be a password, and not necessarily associated with a specific card.

In banking systems, PIN management and security are governed by international standard .


  • History 1
  • PIN length 2
  • PIN validation 3
    • IBM 3624 method 3.1
    • IBM 3624 + offset method 3.2
    • VISA method 3.3
  • PIN security 4
    • Implementation flaws 4.1
    • Choosing a secure PIN 4.2
  • Reverse PIN hoax 5
  • Mobile phone passcodes 6
  • See also 7
  • References 8


The PIN originated with the introduction of the ATM in 1967, as an efficient way for banks to dispense cash to their customers. The first ATM system was that of Barclays in London, in 1967; it accepted cheques with machine-readable encoding, rather than cards, and matched the PIN to the cheque.[2][3][4] In 1972, Lloyds Bank issued the first bank card to feature an information-encoding magnetic strip, using a PIN for security.[5]

In 2006, James Goodfellow, the inventor who patented the first personal identification number, was awarded an OBE in the Queen's Birthday Honours.[6]

PIN length

The inventor of the ATM, John Shepherd-Barron, at first envisioned a six-digit numeric code for customer authentication. His wife however could only remember four digits, which became the most commonly used length.[3]

ISO 9564-1, the international standard for PIN management and security in retail banking, allows for PINs from four up to twelve digits, but also notes that "For usability reasons, an assigned numeric PIN should not exceed six digits in length."[7] Financial PINs are often four-digit numbers, with Switzerland being a notable exception with six-digit PINs being given by default. Almost all countries in South East Asia use six-digit pins and have been since ATMs were introduced. Four-digit pins are unheard of in Malaysia.

PIN validation

There are several main methods of validating PINs. The operations discussed below are usually performed within a hardware security module (HSM).

IBM 3624 method

One of the earliest ATM models was the IBM 3624, which used the IBM method to generate what is termed a natural PIN. The natural PIN is generated by encrypting the primary account number (PAN), using an encryption key generated specifically for the purpose.[8] This key is sometimes referred to as the PIN generation key (PGK). This PIN is directly related to the primary account number. To validate the PIN, the issuing bank regenerates the PIN using the above method, and compares this with the entered PIN.

Natural PINs can not be user selectable because they are derived from the PAN. If the card is reissued with a new PAN, a new PIN must be generated.

Natural PINs allow banks to issue PIN reminder letters as the PIN can be generated.

IBM 3624 + offset method

To allow user selectable PINs it is possible to store a PIN offset value. The offset is found by subtracting natural PIN from the customer selected PIN using modulo 10.[9] For example, if the natural PIN is 1234, and the user wishes to have a PIN of 2345, the offset is 1111.

The offset can be stored either on the card track data,[10] or in a database at the card issuer.

To validate the PIN, the issuing bank calculates the natural PIN as in the above method, then adds the offset and compares this value to the entered PIN.

VISA method

Disbursing Clerk 1st Class Gene Tecson holds a keypad for a customer to enter his Navy Cash Card personal identification number aboard the amphibious assault ship USS Peleliu (LHA 5). The system eliminates cash and coins from the entire ship and instead requires sailors to add money from their personal bank accounts to one of two systems held on the cash card.

The VISA method is used by many card schemes and is not VISA-specific. The VISA method generates a PIN verification value (PVV). Similar to the offset value, it can be stored on the card's track data, or in a database at the card issuer. This is called the reference PVV.

The VISA method takes the rightmost eleven digits of the PAN excluding the checksum value, a PIN validation key index (PVKI, chosen from one to six) and the required PIN value to make a 64 bit number, the PVKI selects a validation key (PVK, of 128 bits) to encrypt this number. From this encrypted value, the PVV is found.[11]

To validate the PIN, the issuing bank calculates a PVV value from the entered PIN and PAN and compares this value to the reference PVV. If the reference PVV and the calculated PVV match, the correct PIN was entered.

Unlike the IBM method, the VISA method doesn't derive a PIN. The PVV value is used to confirm the PIN entered at the terminal, was also used to generate the reference PVV. The PIN used to generate a PVV can be randomly generated or user selected or even derived using the IBM method.

PIN security

Financial PINs are often four-digit numbers in the range 0000-9999, resulting in 10,000 possible numbers. Switzerland issues six-digit PINs by default.

Some systems set up default PINs and most allow the customer to set up a PIN or to change the default one, and on some a change of PIN on first access is mandatory. Customers are usually advised not to set up a PIN based on their or their spouse's birthdays, on driver license numbers, consecutive or repetitive numbers, or some other schemes. Some financial institutions do not give out or permit PINs where all digits are identical (such as 1111, 2222, ...), consecutive (1234, 2345, …), numbers that start with one or more zeroes, or the last four digits of the cardholder's social security number or birth date.

Many PIN verification systems allow three attempts, thereby giving a card thief a putative 0.03% probability of guessing the correct PIN before the card is blocked. This holds only if all PINs are equally likely and the attacker has no further information available, which has not been the case with some of the many PIN generation and verification algorithms that financial institutions and ATM manufacturers have used in the past.[12]

Research has been done on commonly used PINs.[13] The result is that without forethought, a sizable portion of users may find their PIN vulnerable. "Armed with only four possibilities, hackers can crack 20% of all PINs. Allow them no more than fifteen numbers, and they can tap the accounts of more than a quarter of card-holders."[14]

Breakable PINs can worsen with length, to wit:

The problem with guessable PINs surprisingly worsens when customers are forced to use additional digits, moving from about a 25% probability with fifteen numbers to more than 30% (not counting 7-digits with all those phone numbers). In fact, about half of all 9-digit PINs can be reduced to two dozen possibilities, largely because more than 35% of all people use the all too tempting 123456789. As for the remaining 64%, there's a good chance they're using their Social Security Number, which makes them vulnerable. (Social Security Numbers contain their own well-known patterns.)[14]

Implementation flaws

In 2002 two PhD students at Cambridge University, Piotr Zieliński and Mike Bond, discovered a security flaw in the PIN generation system of the IBM 3624, which was duplicated in most later hardware. Known as the decimalization table attack, the flaw would allow someone who has access to a bank's computer system to determine the PIN for an ATM card in an average of 15 guesses.[15][16]

Choosing a secure PIN

The ideal PIN is mostly randomized but hard to read when entered. They can be stored in secure password managers.

Reverse PIN hoax

Rumours have been in e-mail circulation claiming that in the event of entering a PIN into an ATM backwards, police will be instantly alerted as well as money being ordinarily issued as if the PIN had been entered correctly.[17] The intention of this scheme would be to protect victims of muggings; however, despite the system being proposed for use in some US states,[18][19] there are no ATMs currently in existence that employ this software.

Mobile phone passcodes

A mobile phone may be PIN protected. If enabled, the PIN (also called a passcode) for GSM mobile phones can be between four and eight digits[20] and is recorded in the SIM card. If such a PIN is entered incorrectly three times, the SIM card is blocked until a personal unblocking code (PUC or PUK), provided by the service operator, is entered. If the PUC is entered incorrectly ten times, the SIM card is permanently blocked, requiring a new SIM card from the mobile carrier service.

See also


  1. ^ Your ID number is not a password,, 8 November 2010
  2. ^ Jarunee Wonglimpiyara, Strategies of Competition in the Bank Card Business (2005), p. 1-3.
  3. ^ a b "The man who invented the cash machine". BBC. 2007-06-25. Retrieved 2014-06-15. 
  4. ^ "ATM inventor John Shepherd-Barron dies at age of 84 on 20th May 2010". The LA Times, May 19, 2010. 19 May 2010. 
  5. ^ Jarunee Wonglimpiyara, Strategies of Competition in the Bank Card Business (2005), p. 5.
  6. ^ "Royal honour for inventor of Pin". BBC. 2006-06-16. Retrieved 2007-11-05. 
  7. ^ ISO 9564-1:2002 Banking -- Personal Identification Number (PIN) management and security -- Part 1: Basic principles and requirements for online PIN handling in ATM and POS systems, clause 7.1
  8. ^ "3624 PIN Generation Algorithm". IBM. 
  9. ^ "PIN Offset Generation Algorithm". IBM. 
  10. ^ "Track format of magnetic stripe cards". 
  11. ^ "PVV Generation Algorithm". IBM. 
  12. ^ Kuhn, Markus (July 1997). "Probability theory for pickpockets — ec-PIN guessing" (PDF). Retrieved 2006-11-24. 
  13. ^ Nick Berry (28 September 2012). "The most common pin numbers: is your bank account vulnerable?". Guardian newspaper website. Retrieved 2013-02-25. 
  14. ^ a b Lundin, Leigh (2013-08-04). "PINs and Passwords, Part 1". Passwords.  
  15. ^ Zieliński, P & Bond, M (February 2003). "Decimalisation table attacks for PIN cracking" (PDF). University of Cambridge Computer Laboratory. Retrieved 2006-11-24. 
  16. ^ "Media coverage". University of Cambridge Computer Laboratory. Retrieved 2006-11-24. 
  17. ^ "Reverse PIN Panic Code". Retrieved 2007-03-02. 
  18. ^ Full Text of SB0562 Illinois General Assembly, accessed 2011-07-20
  19. ^ sb379_SB_379_PF_2.html Senate Bill 379 Georgia General Assembly, published 2006, accessed 2011-07-20
  20. ^ 082251615790GSM 02.17 Subscriber Identity Modules, Functional Characteristics, version 3.2.0, February 1992, clause 3.1.3
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.