Cryptogram: What Really Validates a Card Transaction
I explain what a cryptogram is in the context of EMV and digital wallets, how it's generated, how the issuer validates it, the differences between ARQC and AAV, the impact of the ECI, and common integration errors that affect approval and fraud.
In my day-to-day work with payment integrations, I've seen this scenario many times:
We're using a token, so it's secure.
We sent the wallet indicator, so everything's fine.
And when you investigate the drop in approval rates or the increase in fraud... the problem lies in the cryptogram.
Many people implement tokenization, 3DS, wallets, but don't understand what really proves that a transaction is legitimate at the network layer. And that proof, in most cases, is the cryptogram.
Today I'm going to explain what it is, how it works behind the scenes, and why it directly impacts approval, risk, and chargebacks.
What is a Cryptogram?
A cryptogram is a cryptographic value generated dynamically for a specific transaction.
It functions as:
- Proof of credential ownership
- Proof of transaction integrity
- Anti-replay mechanism
If someone intercepts the message and tries to reuse it, it won't work.
Where Does it Come From? (EMV Explained Quickly)
The cryptogram originates within the EMV (Europay, Mastercard, Visa) standard.
EMV is the global standard that defines how chip cards work.
When you insert a physical card into the machine:
- The terminal sends commands to the chip
- The chip responds via APDU (Application Protocol Data Unit)
- which is basically the message format for communication with the chip
- The chip generates a unique cryptogram for that transaction
This cryptogram is called:
- ARQC (Authorization Request Cryptogram)
It is validated by the issuer.
If valid → transaction can be authorized If invalid → denied
What About E-commerce?
In traditional e-commerce (card entered manually), there is usually no real EMV cryptogram.
But when we talk about:
- Apple Pay
- Google Pay
- Click to Pay
- Card brand tokenization
A digital cryptogram does exist.
In this case:
- It is generated based on keys stored in the Secure Element or secure environment
- It is sent along with the token (DPAN)
- The card network validates it before forwarding it to the issuer
Simple Analogy
Think of the card as a safe.
The token is a controlled copy of the key.
The cryptogram is the digital signature that says:
This key was used now, in this specific transaction, for this specific amount.
Without this signature, the system doesn't fully trust it.
Types of Cryptograms You'll Encounter
1. ARQC
Authorization Request Cryptogram Generated for online authorization.
2. TC
Transaction Certificate Generated when the transaction is approved offline.
3. AAC
Application Authentication Cryptogram Indicates offline rejection.
In the digital world, you may also hear about:
- AAV (Accountholder Authentication Value)
- Wallet cryptogram
They are not identical to the physical ARQC, but they serve a similar role as cryptographic proof.
How it Works Behind the Scenes
Let's simplify the technical flow:
- Transaction data is assembled:
- amount
- currency
- date
- terminal id
- The card (or secure environment) uses:
- a secret symmetric key
- transaction counter
-
It applies a cryptographic algorithm (usually based on 3DES or AES)
-
Generates the cryptogram
The issuer has the corresponding key.
It recalculates the cryptogram on its side.
If it matches → valid If it doesn't match → fraud or integration error
What Can Go Wrong in Practice?
Here's where the part that few people talk about comes in.
1. Inconsistent Fields
If you change:
- Amount
- Currency
- Security indicators
Without maintaining consistency with what was used to generate the cryptogram, it fails validation.
2. Incorrect ECI
The ECI (Electronic Commerce Indicator) indicates the security level of the transaction.
If the ECI does not match the type of cryptogram sent:
- You may lose liability shift
- You may have a downgrade
- It may increase fraud
3. Incomplete Wallet Integration
I've seen cases:
- Sending token
- But ignoring cryptogram
- Or mapping the wrong field in the acquirer
Result? The transaction basically becomes a common manually entered card.
Real Impact on Business
A well-implemented cryptogram means:
- Higher approval rate
- Less fraud
- Liability shift when applicable
- Fewer chargebacks
A poorly implemented cryptogram means:
- Technically "valid" transaction
- But with high risk
- And potential financial loss
Difference Between Token and Cryptogram
I always explain it like this:
- Token replaces the card number
- Cryptogram proves that the transaction is legitimate
One without the other is an incomplete solution.
What You Should Take Away From This
If you work with payments, understand:
- Cryptogram is not a technical detail.
- It is the cryptographic layer that underpins transaction trust.
- A wallet without the correct cryptogram loses much of its benefit.
- Poorly mapped integration can destroy approval rates.
Before discussing fraud or conversion rates, we should always review:
Are we correctly sending the cryptogram and the ECI?
If you've never validated this in your integration, it's worth reviewing now.
In the next article I can delve deeper into:
- How the issuer validates an ARQC
- Practical difference between ARQC and AAV
- How the ECI influences liability shift
- Classic integration errors that drop approval rates
Because in payment methods, security and approval go hand in hand, and the cryptogram is exactly in the middle of that path.