EMV authenticates the card. PIN still helps authenticate the cardholder.
For years, PIN has been treated as a legacy payment ritual: an extra step at the terminal, a bit of friction in a world shaped by contactless cards, mobile wallets, and invisible checkout. That interpretation misses what PIN actually does.
In card-present payments, EMV does an excellent job of authenticating the card — transaction-specific cryptographic evidence (the ARQC) makes cloning and counterfeit fraud much harder. But EMV does not, by itself, prove that the person holding the card is the legitimate cardholder. That is a separate problem. It is exactly why PIN still matters.
The Threat Model: What Chip Solves vs. What PIN Solves
Treating “chip security” as if it solved everything leads to bad risk decisions.
EMV chip addresses the authenticity of the card and the integrity of transaction data. The key question it answers is: Is this card genuine?
PIN addresses a different question: Is the person presenting this card the legitimate cardholder?
A genuine card in the wrong hands is still a fraud risk. A stolen card can still be inserted into a terminal. Post-EMV data bears this out: markets that used chip-and-signature or chip-and-no-CVM saw counterfeit fraud fall sharply but retained relatively high lost-and-stolen fraud; chip-and-PIN markets tended to show stronger reductions across both. The chip and PIN do not compete — they are two controls for two distinct problems in the same flow.
Cardholder Verification in EMV: Where PIN Fits
Within EMV, PIN is a Cardholder Verification Method (CVM). The baseline methods include:
- Online PIN — encrypted at the terminal, verified by the issuer or its HSM during authorisation.
- Offline PIN — verified on the chip, with retry limits enforced by a PIN Try Counter.
- Signature — human comparison; no cryptographic binding to the cardholder.
- No CVM — low-value and some unattended or contactless contexts.
Issuers encode strategy in the CVM List (tag 8E); the kernel walks the list and applies the first mutually supported method whose condition is true. Architecturally, preferring PIN over signature or no-CVM is the decision to demand real cardholder authentication rather than convenience-only verification.
How Online PIN Protects the PIN
In online PIN, sensitive handling stays in tamper-resistant hardware and issuer-side HSMs:
- Cardholder enters the PIN on a PCI-approved PIN Entry Device (PED).
- The PED formats an ISO PIN block (typically Format 0) and encrypts it before it leaves the secure device.
- The acquirer forwards the encrypted PIN block to the issuer; an HSM decrypts and verifies against a protected reference.
- The issuer enforces retry limits and returns an authorisation decision; the terminal records the outcome in the Terminal Verification Results (TVR).
Merchant systems and networks see only an encrypted PIN block — never the clear PIN. Even if the merchant environment is compromised, an attacker may get card data and cryptogram material, but not cardholder PINs. For POS and acquiring architects, the job is a clean end-to-end PIN security domain around PEDs and HSM paths — not handling PINs in application logic.
Offline PIN: On-Chip Verification and Real-World Resilience
Offline PIN moves cardholder verification onto the chip — essential when connectivity is intermittent or absent (fuel, transit, rural merchants, resilience-oriented acceptance).
Mechanics in brief: the card holds a reference PIN and a PIN Try Counter (tag 9F17) in secure memory; the PED captures entry and the chip verifies via EMV VERIFY; on failure the counter decrements; CVM rules determine whether another method can apply or verification fails entirely. The issuer does not see the PIN, but can trust the chip’s outcome; brute force is capped by the try counter. Exhaust the counter and the card is PIN-locked until issuer reset or replacement.
That same property makes PIN a continuity control, not only a fraud control: verification can still run when the terminal cannot reach the issuer immediately. A mechanism that only works when every upstream dependency is healthy is useful; one that still functions when conditions degrade is strategically valuable. Offline PIN costs more to implement and test than online PIN — but it preserves strong CVM semantics at the edge.
What PIN Mitigates in Acquiring
Lost and stolen cards — Without PIN, a thief can insert or tap a genuine card up to scheme limits until risk rules intervene. With PIN, they need the secret; guessing is bounded by issuer controls or the offline try counter. The attacker needs both the instrument and the knowledge factor.
Data-only compromises — Skimming and malware can capture PAN, expiry, and track-equivalent data; in EMV+PIN environments that is often insufficient for PIN-verified card-present abuse, pushing criminals toward CNP, PIN-less debit, and social engineering — each addressable with different controls.
Disputes and liability — A transaction logged as PIN-verified is treated as higher-assurance evidence of cardholder involvement. Networks still differentiate these categories in pricing and risk models; empirically, PIN-verified flows tend to show lower fraud per transaction than signature or no-CVM where those comparisons apply.
Contactless, Limits, and CDCVM
Contactless did not retire PIN — it rebalanced when it appears. Low-value tap often uses no CVM by design: bounded exposure for speed. Above the contactless CVM limit (and with cumulative counters where schemes require), terminals step up — for card-based flows, typically online PIN. The framing is not contactless replaced PIN; it is contactless reduced visible PIN in low-risk paths, while PIN remains the default strong CVM when risk rises.
On phones, consumers may use biometrics or device passcode instead of keypad PIN — Consumer Device CVM (CDCVM) satisfies the same architectural requirement: strong cardholder verification with a different interface. Visible PIN declined; the requirement for a strong CVM did not.
Known Weaknesses — In Context
Relay attacks and historical PIN-bypass flaws are real and deserve acknowledgment: they are implementation and ecosystem issues, tightened by certification, ARQC binding, and monitoring — not proofs that PIN is useless. For the bulk of attacks, requiring a correct PIN still blocks trivial misuse of stolen cards. PIN is one layer in a stack, not the only layer.
Design Implications for Acquirers and POS Architects
- Prefer PIN-capable CVM strategies where rules allow, over signature-only or no-CVM for attended POS when you need cardholder assurance.
- Set sensible contactless CVM limits and counters; step up to PIN or CDCVM above thresholds to bound lost-and-stolen exposure.
- Isolate the PIN path: certified PEDs, HSM-backed verification, no clear PIN in merchant logic or logs.
- Invest in offline PIN where outages or offline-first models matter — complexity is justified by edge resilience.
- Use CVM outcomes in risk analytics — a PIN-verified ARQC with a clean TVR is a different signal from no-CVM contactless at a new merchant.
The broader stack is layered: EMV cryptography for the card, secure PIN capture and HSM verification for the cardholder, device trust, risk engines, tokenisation where relevant, and scheme compliance. The principle is not PIN or modern security — it is PIN as part of layered modern security.
The Bottom Line
Payments security is not only about verifying the card. It is about verifying the cardholder, assigning liability fairly, and keeping acceptance secure when networks are imperfect. PIN stays relevant because it still does that job at scale: simple, widely deployed, strong evidentiary value, and usable offline alongside chip authentication.
The future is not “PIN everywhere forever” or “PIN disappears” — it is layered authentication: chip for the card, PIN or equivalent strong CVM for the user, risk engines for context, secure devices at the edge. EMV made card data harder to abuse; PIN and its successors make the card harder to abuse in the wrong hands. You still need both.
The ideas here align with how CVM, terminals, and acquiring risk fit together in Point-of-Sale Systems Architecture — Volume 1: A Practical Guide to Secure, Certifiable POS Systems — security as a system, not a single feature.
References
- EMVCo Book 3 (Application Specification) — CVM List, VERIFY, cardholder verification
- EMVCo Book 4 — PED and PIN entry interfaces
- ISO 9564 — PIN encipherment and PIN block formats
- PCI PTS — POI and PIN security requirements
- PIN Translation: Bridging Cryptographic Worlds Inside the HSM — PIN block handling in the authorisation path