Security Attacks and Countermeasures in DOCSIS Networks

Total Page:16

File Type:pdf, Size:1020Kb

Security Attacks and Countermeasures in DOCSIS Networks Submitted by Christian Voglhuber Submitted at Institute of Networks and Security Supervisor Assoc. Prof. Mag. Dipl.-Ing. Dr. Michael Sonntag Security attacks and February 2019 countermeasures in DOCSIS networks Master Thesis to obtain the academic degree of Diplom-Ingenieur in the Master’s Program Computer Science JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Abstract I Abstract This thesis focuses on the security aspects of cable networks. DOCSIS is a speficiation which is used by many cable operators to offer data services, like internet access, over existing TV-cables and architectures. The functionality and features of DOCSIS are described and security properties are evaluated. Moreover, a test system is deployed to simulate passive and active attacks. Those results are used to eliminate the vulnerabilities and problems of the DOCSIS network by securing the involved parts. Issues of the data encryption, authentication of modems, and provider headend equipment are presented. A case study reveals the state of security of two Austrian cable operators. Thereby many issues and vulnerabilities are detected, by merely passively sniffing the signals of a typical television port. Kurzfassung II Kurzfassung Diese Arbeit beschäftigt sich mit der Sicherheit von Kabelnetzwerken. DOCSIS ist eine Spezifikation, welche von vielen Kabelbetreibern verwendet wird um Datendienste, wie etwa Internetzugang, über vohandene TV-Kabel und Strukturen anbieten zu können. Die Funktion und Architektur von DOCSIS wird beschrieben und sicherheitsrelevante Eigenschaften aufgezeigt. Weiters wird ein Testsystem eingerichtet, um Angriffe in DOCSIS Netzwerken zu simulieren und zu identifizieren wie mögliche Probleme behoben werden können. Attacken auf die Datenverschlüsselung, Authentifizierung der Modems und der Provider-Kopfstation werden eruiert. Eine Fallstudie untersucht die Sicherheit von zwei österreichischen Kabelbetreibern. Dabei wurden viele Probleme, nur durch passives Empfangen der Signale auf einem handelsüblichen TV-Anschluss, aufgedeckt. Contents III Contents 1. Introduction1 1.1. Motivation..................................2 1.2. Task description...............................2 1.2.1. Practical...............................2 1.2.1.1. Lab scenarios........................4 1.2.2. Case study..............................5 2. The Data Over Cable Service Interface Specification (DOCSIS)6 2.1. Topology of a CATV-system.........................7 2.1.1. Variations...............................8 2.1.2. Security risks.............................9 2.2. DOCSIS Stack................................ 10 2.3. The cable modem registration process................... 11 2.4. DOCSIS 1.0.................................. 15 2.4.1. Baseline-Privacy-Interface...................... 15 2.5. DOCSIS 1.1.................................. 17 2.5.1. Baseline-Privacy-Interface-Plus................... 18 2.6. DOCSIS 2.0.................................. 19 2.7. DOCSIS 3.0.................................. 19 2.7.1. SEC.................................. 20 2.8. DOCSIS 3.1.................................. 22 2.9. DOCSIS over PON.............................. 22 2.10. Alternatives and comparison to other protocols.............. 23 3. Practical DOCSIS networks 26 3.1. Lab environment............................... 26 3.1.1. Cable plant.............................. 27 3.1.2. CMTS................................. 29 3.1.3. Cable modems............................ 31 3.1.4. Provisioning system......................... 32 3.1.5. Core router.............................. 36 3.2. Attack scenarios............................... 37 3.2.1. Passive attacks............................ 37 3.2.1.1. Sniffing downstream.................... 38 Contents IV 3.2.1.2. Decoding DOCSIS downstream traffic.......... 39 3.2.2. Active attacks............................ 41 3.2.2.1. Cloning modems...................... 41 3.2.2.2. Bypassing settings..................... 47 3.2.2.3. Unallowed service usage.................. 52 3.2.2.4. Downgrade attacks.................... 59 3.2.3. Other issues and improvements................... 64 3.2.3.1. Network enhancements.................. 64 3.2.3.2. Network attacks...................... 67 4. Additional security concerns in DOCSIS networks 71 4.1. Physical attacks................................ 71 4.1.1. Cable modem swap.......................... 71 4.1.2. Manageable HFC devices...................... 72 4.1.3. Pre-equalization........................... 74 4.2. Passive attacks................................ 75 4.2.1. Deciphering the downstream traffic................. 75 4.2.2. Upstream sniffing........................... 78 4.3. Active attacks................................. 82 4.3.1. Denial-of-service attacks....................... 83 4.3.2. Man-in-the-middle attacks...................... 86 4.3.3. Network attacks........................... 88 4.3.4. Insider attacks............................ 88 4.4. Implementation issues............................ 89 4.4.1. Headend network........................... 90 4.4.2. Cable Modems............................ 91 4.5. Legal aspects................................. 97 4.5.1. Technical limitations......................... 97 4.5.2. Patents................................ 98 4.5.3. Issues and denouncements...................... 100 5. Analysis and evaluation of existing cable networks 101 5.1. Information Intercept............................ 101 5.2. Sniffing System Method and Considerations................ 104 5.2.1. Signal Filters............................. 105 5.2.2. Sniffing Detection.......................... 105 5.2.3. Hardware............................... 105 5.2.4. Software................................ 106 5.3. Analysis.................................... 109 5.3.1. Provider I............................... 109 5.3.1.1. Results........................... 109 Contents V 5.3.2. Provider II.............................. 112 5.3.2.1. Results........................... 112 5.3.2.2. Analysis on different Media................ 118 5.3.3. International Providers....................... 118 5.3.4. Provisioning Systems......................... 118 5.4. Conclusion.................................. 120 6. Future work and outlook 122 6.1. Theoretical study............................... 122 6.2. Practical ideas................................ 124 7. Conclusions 126 A. Appendix 128 A.1. Practical DOCSIS networks......................... 128 A.1.1. Components............................. 128 A.1.2. Configuration files.......................... 128 A.1.2.1. Provisioning system.................... 129 A.1.2.2. CMTS........................... 136 A.2. Case Study.................................. 138 A.2.1. Components............................. 138 A.2.1.1. Software.......................... 138 A.2.2. Analysis................................ 139 A.2.2.1. Provider II......................... 139 Introduction 1 Chapter 1. Introduction Cable Television networks were developed to supply many people with the ability to watch TV cheaply. Since the first development and construction of a Community- Antenna-Television (CATV) system in 1948, the industry in connection to this technology has grown rapidly. Providers of such systems supply customers not only with pure TV reception, but they also offer Triple-Play solutions (Voice, Video, and Data) to end- and business-customers to compete with other companies and their technologies (like DSL). Traditional Cable-TV-systems use a common medium, also known as shared-medium. Therefore, each subscriber receives the same information. At the beginning of the Internet success, it was clear that also private subscribers wanted the technology to surf the web. The cable companies decided to investigate on this, to be competitive and offer internet access via their CA-TV-Systems. To enable this, the research began to develop a technology to transmit data in both directions via the common media, which resulted in lots of proprietary product solutions. The main problem in the first place was to enable a bi-directional communication to the customers, which means that they can also transmit data and send it back to the provider. The first systems used a (Dial-Up) telephone line to make this transmission of data at the subscriber possible, and the reception was enabled via the normal CATV-System. This solution was not practical and the prices were too high, because of the extra telephone costs. At the time of the DSL technology development it was clear that there must be a practical solution to deliver high-speed internet access to the regular Cable-TV subscriber. Therefore, an open market for CATV data equipment has to be established to shrink the hardware prices and to make different vendors work together [54]. The industry developed the Data Over Cable Service Interface Specification (DOCSIS), to enable high-speed data communication over Cable-TV-Networks, which has the goal to deliver internet access to the Cable-TV subscribers. [10] One of the biggest problems of CATV-Systems is the usage of a common media. Each subscriber receives all information. The result of such an architecture is very problematic regarding security. The requirements for securing this system are comparable with WiFi Introduction 2 networks (IEEE 802.11), but the attack range is much bigger because whole cities can be harmed. Therefore, a security concept has to be implemented, which makes sure information can only be sent and received at the corresponding device. 1.1. Motivation The
Recommended publications
  • Ipv6 Support in Home Gateways
    IPv6 Support in Home Gateways Chris Donley [email protected] 0 Agenda • Introduction • Basic Home Gateway Architecture • DOCSIS® Support for IPv6 • CableLabs eRouter Specification • IETF IPv6 CPE Router • IPv6 Transition Technologies • Ongoing Initiatives Cable Television Laboratories, Inc. 2010. All Rights Reserved. 1 Introduction • Service Providers are beginning to offer IPv6 service • Home Gateways are instrumental in determining IPv6 service characteristics • CableLabs and the IETF have developed compatible specifications for IPv6 Home Gateways • During the transition to IPv6, co-existence with IPv4 is required » Many clients will not be upgradable to IPv6 » A significant amount of content will remain accessible only through IPv4 • As we approach IPv4 exhaustion, new transition technologies such as NAT444, Dual-Stack Lite, and 6RD will be important for such gateways. Cable Television Laboratories, Inc. 2010. All Rights Reserved. 2 Basic Home Gateway Architecture • Basic IPv6 Home Gateways are envisioned as extensions of existing IPv4 gateways » One or two customer-facing interfaces » One physical service provider-facing interface • Gateways assign addresses to CPE devices » Stateless Address Autoconfiguration (SLAAC, RFC 4862) » Stateful DHCPv6 (RFC 3315) • Gateways provide some level of security to home networks Cable Television Laboratories, Inc. 2010. All Rights Reserved. 3 Home Gateway Architecture Cable Television Laboratories, Inc. 2010. All Rights Reserved. 4 DOCSIS® Support for IPv6 • DOCSIS specifications define a broadband
    [Show full text]
  • A Quantitative Study of Advanced Encryption Standard Performance
    United States Military Academy USMA Digital Commons West Point ETD 12-2018 A Quantitative Study of Advanced Encryption Standard Performance as it Relates to Cryptographic Attack Feasibility Daniel Hawthorne United States Military Academy, [email protected] Follow this and additional works at: https://digitalcommons.usmalibrary.org/faculty_etd Part of the Information Security Commons Recommended Citation Hawthorne, Daniel, "A Quantitative Study of Advanced Encryption Standard Performance as it Relates to Cryptographic Attack Feasibility" (2018). West Point ETD. 9. https://digitalcommons.usmalibrary.org/faculty_etd/9 This Doctoral Dissertation is brought to you for free and open access by USMA Digital Commons. It has been accepted for inclusion in West Point ETD by an authorized administrator of USMA Digital Commons. For more information, please contact [email protected]. A QUANTITATIVE STUDY OF ADVANCED ENCRYPTION STANDARD PERFORMANCE AS IT RELATES TO CRYPTOGRAPHIC ATTACK FEASIBILITY A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Computer Science By Daniel Stephen Hawthorne Colorado Technical University December, 2018 Committee Dr. Richard Livingood, Ph.D., Chair Dr. Kelly Hughes, DCS, Committee Member Dr. James O. Webb, Ph.D., Committee Member December 17, 2018 © Daniel Stephen Hawthorne, 2018 1 Abstract The advanced encryption standard (AES) is the premier symmetric key cryptosystem in use today. Given its prevalence, the security provided by AES is of utmost importance. Technology is advancing at an incredible rate, in both capability and popularity, much faster than its rate of advancement in the late 1990s when AES was selected as the replacement standard for DES. Although the literature surrounding AES is robust, most studies fall into either theoretical or practical yet infeasible.
    [Show full text]
  • DOCSIS 3.1 Physical Layer Specification
    Data-Over-Cable Service Interface Specifications DOCSIS® 3.1 Physical Layer Specification CM-SP-PHYv3.1-I10-170111 ISSUED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. You may download, copy, distribute, and reference the documents herein only for the purpose of developing products or services in accordance with such documents, and educational use. Except as granted by CableLabs® in a separate written license agreement, no license is granted to modify the documents herein (except via the Engineering Change process), or to use, copy, modify or distribute the documents for any other purpose. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. To the extent this document contains or refers to documents of third parties, you agree to abide by the terms of any licenses associated with such third-party documents, including open source licenses, if any. Cable Television Laboratories, Inc. 2013-2017 CM-SP-PHYv3.1-I10-170111 Data-Over-Cable Service Interface Specifications DISCLAIMER This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein.
    [Show full text]
  • Declaration Under Section 4 (4) of the Telecommunication (Broadcasting and Cable) Services Interconnection (Addressable System) Regulation, 2017 (No
    Version 1.0/2019 Declaration Under Section 4 (4) of The Telecommunication (Broadcasting and Cable) Services Interconnection (Addressable System) Regulation, 2017 (No. 1 of 2017) 4(4)a: Target Market Distribution Network Location States/Parts of State covered as "Coverage Area" Bangalore Karnataka Bhopal Madhya Pradesh Delhi Delhi; Haryana; Rajasthan and Uttar Pradesh Hyderabad Telangana Kolkata Odisha; West Bengal; Sikkim Mumbai Maharashtra 4(4)b: Total Channel carrying capacity Distribution Network Location Capacity in SD Terms Bangalore 506 Bhopal 358 Delhi 384 Hyderabad 456 Kolkata 472 Mumbai 447 Kindly Note: 1. Local Channels considered as 1 SD; 2. Consideration in SD Terms is clarified as 1 SD = 1 SD; 1 HD = 2 SD; 3. Number of channels will vary within the area serviced by a distribution network location depending upon available Bandwidth capacity. 4(4)c: List of channels available on network List attached below in Annexure I 4(4)d: Number of channels which signals of television channels have been requested by the distributor from broadcasters and the interconnection agreements signed Nil Page 1 of 37 Version 1.0/2019 4(4)e: Spare channels capacity available on the network for the purpose of carrying signals of television channels Distribution Network Location Spare Channel Capacity in SD Terms Bangalore Nil Bhopal Nil Delhi Nil Hyderabad Nil Kolkata Nil Mumbai Nil 4(4)f: List of channels, in chronological order, for which requests have been received from broadcasters for distribution of their channels, the interconnection agreements
    [Show full text]
  • Catvision Limited
    CATVISION LIMITED BASIC SERVICE TIER (BST) Sr. No. Channel Name Genre 1 Sahara One GEC Hindi 2 DD National GEC Hindi 3 DD Bharati GEC Hindi 4 Manoranjan TV GEC Hindi 5 Dabangg GEC Hindi 6 Firangi GEC Hindi 7 Filmy Hindi Movies 8 B4U Movies India Hindi Movies 9 Manoranjan Movies Hindi Movies 10 Dangal TV Hindi Movies 11 Cinema TV (India) Hindi Movies 12 Wow Cinema Hindi Movies 13 Enterr 10 Hindi Movies 14 Movie House Hindi Movies 15 House Full Movies Hindi Movies 16 House Full Action Hindi Movies 17 Oscar Movies Bhojpuri Bhojpuri Movies 18 Bhojpuri Cinema Bhojpuri Movies 19 Fight Sports Sports 20 DD Sports Sports 21 Samay National Hindi News 22 News 1 India Hindi News 23 News Nation Hindi News 24 News State MP & CHG Hindi News 25 News State UP & UK Hindi News 26 DD News Hindi News 27 India News Hindi News 28 Lok Sabha TV Hindi News 29 Rajya Sabha TV Hindi News 30 DD North-East Hindi News 31 DD Uttar Pradesh Hindi News 32 India TV (India) Hindi News 33 News State UP & UK Hindi News 34 News 24 (India) Hindi News 35 Dilli Aaj Tak Hindi News 36 ABP News India Hindi News 37 DD India Hindi News 38 Samay UP/Uttarakhand Hindi News Sr. No. Channel Name Genre 39 Zee News Hindi News 40 Zee Punjab Haryana Himachal Hindi News 41 TV 9 Telugu Regional News 42 TV 1 Telugu Regional News 43 TV 9 Kannada Regional News 44 News 9 Regional News 45 TV 9 Maharashtra Regional News 46 TV 9 Gujarat Regional News 47 Sadhna Prime News Regional News 48 ANM News Regional News 49 Super TV (India) Regional News 50 Jai Maharashtra Regional News 51 News Time Bangla Regional
    [Show full text]
  • Channel List: 1 DD National SD Hindi Entertainment 114 FTA FTA FTA 2 Star Plus HD HD Hindi Entertainment 115 Pay ₹ 19.00 ₹
    Channel List: - Channels, EPG numbers and prices are subject to change. - MRP: Maximum Retail Price, per month. DRP (Distributor Retail Price) of all channels is the same as the MRP. - Pack lock-in duration: 1 day Sr. Channel Name HD/SD Genre EPG No. FTA/Pay MRP MRP + No. Tax 1 DD National SD Hindi Entertainment 114 FTA FTA FTA 2 Star Plus HD HD Hindi Entertainment 115 Pay ₹ 19.00 ₹ 22.42 3 Star Plus SD Hindi Entertainment 117 Pay ₹ 19.00 ₹ 22.42 4 Star Bharat HD HD Hindi Entertainment 121 Pay ₹ 19.00 ₹ 22.42 5 Star Bharat SD Hindi Entertainment 122 Pay ₹ 10.00 ₹ 11.80 6 SET HD HD Hindi Entertainment 128 Pay ₹ 19.00 ₹ 22.42 7 SET SD Hindi Entertainment 130 Pay ₹ 19.00 ₹ 22.42 8 Sony SAB HD HD Hindi Entertainment 132 Pay ₹ 19.00 ₹ 22.42 9 Sony SAB SD Hindi Entertainment 134 Pay ₹ 19.00 ₹ 22.42 10 &TV HD HD Hindi Entertainment 137 Pay ₹ 19.00 ₹ 22.42 11 &TV SD Hindi Entertainment 139 Pay ₹ 12.00 ₹ 14.16 12 Zee TV HD HD Hindi Entertainment 141 Pay ₹ 19.00 ₹ 22.42 13 Zee TV SD Hindi Entertainment 143 Pay ₹ 19.00 ₹ 22.42 14 Colors HD HD Hindi Entertainment 147 Pay ₹ 19.00 ₹ 22.42 15 Colors SD Hindi Entertainment 149 Pay ₹ 19.00 ₹ 22.42 16 UTV Bindass SD Hindi Entertainment 153 Pay ₹ 1.00 ₹ 1.18 17 Investigation Discovery SD Hindi Entertainment 155 Pay ₹ 1.00 ₹ 1.18 18 Naaptol SD Shopping 156 FTA FTA FTA 19 Ezmall SD Others 158 FTA FTA FTA 20 Star Utsav SD Hindi Entertainment 171 Pay ₹ 1.00 ₹ 1.18 21 Zee Anmol SD Hindi Entertainment 172 Pay ₹ 0.10 ₹ 0.12 22 Colors Rishtey SD Hindi Entertainment 173 Pay ₹ 1.00 ₹ 1.18 23 Sony Pal SD Hindi Entertainment
    [Show full text]
  • Docsis™ Reliability = Increased Revenue
    IMPROVING DOCSIS RELIABILITY DOCSIS™ RELIABILITY = INCREASED REVENUE Data-over-cable System Interface Specification (DOCSIS) is the vehicle for cable operators to obtain immediate revenue generating opportunities such as Broadband Data, Voice over IP, IP Video-on-Demand, and countless emerging IP-based technologies. These growth channels rely on cable operators obtaining and retaining subscribers. Subscriber satisfaction with new services is a direct function of DOCSIS network reliability. Improving DOCSIS network reliability requires new skills and new test equipment, in addition to the skills and test equipment we possess as an industry today. DOCSIS WORKING MODEL Developed by CableLabs, DOCSIS is the specification which provides a standard for bridging Ethernet data over a Hybrid- Figure 1. DOCSIS Working Model Fiber Coaxial (HFC) network. The DOCSIS specification defines the method by which DOCSIS-based devices operate TROUBLESHOOTING DOCSIS on the RF plant. Fundamentally, there are three layers of communication which must be understood in order to In assessing and improving DOCSIS network reliability, it is analyze a DOCSIS network. critical that all three layers of the DOCSIS working model are analyzed. Impairments that occur in the RF plant may This model is best illustrated in figure 1. The base of the appear to be DOCSIS or IP related problems, similarly pyramid represents the physical layer of DOCSIS. This is problems in the DOCSIS MAC or IP protocols may appear as where data is modulated and up-converted to an RF carrier RF impairments. This creates Finger Pointing; which often for transport across the HFC plant. The middle of the results in significant time loss and money expenditures pyramid is the DOCSIS Media Access Control (MAC) layer.
    [Show full text]
  • New Comparative Study Between DES, 3DES and AES Within Nine Factors
    JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617 152 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ New Comparative Study Between DES, 3DES and AES within Nine Factors Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidan, Hamid A.Jalab, M.Shabbir and Y. Al-Nabhani ABSTRACT---With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. , which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question. Cryptography considers one of the techniques which used to protect the important information. In this paper a three algorithm of multimedia encryption schemes have been proposed in the literature and description. The New Comparative Study between DES, 3DES and AES within Nine Factors achieving an efficiency, flexibility and security, which is a challenge of researchers. Index Terms—Data Encryption Standared, Triple Data Encryption Standared, Advance Encryption Standared.
    [Show full text]
  • The Aes Project Any Lessons For
    THE AES PROJECT: Any Lessons for NC3? THOMAS A. BERSON, ANAGRAM LABORATORIES Technology for Global Security | June 23, 2020 THE AES PROJECT: ANY LESSONS FOR NC3? THOMAS A. BERSON JUNE 23, 2020 I. INTRODUCTION In this report, Tom Berson details how lessons from the Advanced Encryption Standard Competition can aid the development of international NC3 components and even be mirrored in the creation of a CATALINK1 community. Tom Berson is a cryptologist and founder of Anagram Laboratories. Contact: [email protected] This paper was prepared for the Antidotes for Emerging NC3 Technical Vulnerabilities, A Scenarios-Based Workshop held October 21-22, 2019 and convened by The Nautilus Institute for Security and Sustainability, Technology for Global Security, The Stanley Center for Peace and Security, and hosted by The Center for International Security and Cooperation (CISAC) Stanford University. A podcast with Tom Berson and Philip Reiner can be found here. It is published simultaneously here by Technology for Global Security and here by Nautilus Institute and is published under a 4.0 International Creative Commons License the terms of which are found here. Acknowledgments: The workshop was funded by the John D. and Catherine T. MacArthur Foundation. Maureen Jerrett provided copy editing services. Banner image is by Lauren Hostetter of Heyhoss Design II. TECH4GS SPECIAL REPORT BY TOM BERSON THE AES PROJECT: ANY LESSONS FOR NC3? JUNE 23, 2020 1. THE AES PROJECT From 1997 through 2001, the National Institute for Standards and Technology (US) (NIST) ran an open, transparent, international competition to design and select a standard block cipher called the Advanced Encryption Standard (AES)2.
    [Show full text]
  • SFR Transition to 3Rd Wave
    Future of Video Videoscape Architecture Overview Admir Hadzimahovic Systems Engineering Manager – EME VTG May 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Videoscape Architecture Overview Agenda: 1. Key IPTV video drivers 2. Claud – Mediasuit Platform 3. Network and ABR 4. Client – Home Gateway 5. Conductor 6. Demo © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 CES Las Vegas Videoscape © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Consumer Broadcasters CE/Over The Top Service Provider Behavior and Media Video = 91% of consumer New distribution platform & Brand power Multi-screen offering IP traffic by 2014 interactive content – becoming table stakes Sky Sport TV on iPad / RTL on iPhone & iPad 20% New business models – Rising churn and Netflix = 20% of US Hulu 2009 revenue: $100M Building application & Subscriber acquisition cost st downstream internet 1 half 2010 revenue: $100M content eco-systems traffic in peak times Partnerships & Online Video Snacking Hybrid Broadcast Broadband TV: New Streaming Vertical Integration 11.4 Hour /month HbbTV subscription services Experience Diminishing SP Evolving Legacy Fragmentation Network Relevance Infrastructure Consumer Experience Business Models Content Fragmentation Subscription Fragmentation Broadcast, Premium, UGC Broadband, TV, Mobile, Movie rentals, OTT Device & Screen Fragmentation Free vs. Paid TV, PC, Mobile, Gaming, PDA Interactivity Fragmentation Ad Dollars Fragmentation Lean back, Lean forward, Social Transition from linear TV to online © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Presentation_ID © 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 21 But SP’s Struggle to Deliver Online Content Intuitive Unified Navigation on TV /STB for All Content Multi-screen Web 2.0 Experiences on TV experience TV/STB © 2010 Cisco and/or its affiliates.
    [Show full text]
  • Data Encryption Standard
    Data Encryption Standard The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a Data Encryption Standard symmetric-key algorithm for the encryption of electronic data. Although insecure, it was highly influential in the advancement of modern cryptography. Developed in the early 1970s atIBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with theNational Security Agency (NSA), the NBS eventually selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified The Feistel function (F function) of DES design elements, a relatively short key length of the symmetric-key General block cipher design, and the involvement of the NSA, nourishing Designers IBM suspicions about a backdoor. Today it is known that the S-boxes that had raised those suspicions were in fact designed by the NSA to First 1975 (Federal Register) actually remove a backdoor they secretly knew (differential published (standardized in January 1977) cryptanalysis). However, the NSA also ensured that the key size was Derived Lucifer drastically reduced such that they could break it by brute force from [2] attack. The intense academic scrutiny the algorithm received over Successors Triple DES, G-DES, DES-X, time led to the modern understanding of block ciphers and their LOKI89, ICE cryptanalysis.
    [Show full text]
  • APNA CHOICE HINDI 225 225 ### (Pay Channels + Delhi FTA)
    A DELHI / HARYANA /UTTAR PRADESH HATHWAY RECOMMENDED PACK DRP ₹ a (Excluding Tax) APNA CHOICE HINDI 225 225 ### (Pay Channels + Delhi FTA) SD 53 PAY CHANNELS HD 0 TOTAL: 53 LANGUAGE ~ GENRE CHANNEL NAME(S) CHANNEL TYPE ASSAMESE NEWS NEWS18 ASSAM/NE SD ENGLISH MUSIC VH1 SD ENGLISH NEWS CNBC TV18 SD CNN NEWS18 SD ET NOW SD INDIA TODAY SD MIRROR NOW SD NDTV 24X7 SD NDTV PROFIT SD TIMES NOW SD HINDI GEC COLORS SD COLORS RISHTEY SD SONY SD SONY PAL SD SONY SAB SD STAR BHARAT SD STAR PLUS SD STAR UTSAV SD ZOOM SD HINDI MOVIE COLORS CINEPLEX SD MOVIES OK SD SONY MAX SD SONY MAX 2 SD SONY WAH SD STAR GOLD SD STAR UTSAV MOVIES SD HINDI MUSIC MTV SD MTV BEATS SD SONY MIX SD HINDI NEWS AAJ TAK SD CNBC AWAAZ SD NDTV INDIA SD NEWS18 BR/JH SD NEWS18 INDIA SD NEWS18 MPCG SD NEWS18 RAJASTHAN SD NEWS18 UP/UK SD TEZ SD INFOTAINMENT FYI TV18 SD Page 1 of 186 HISTORY TV18 SD NAT GEO WILD SD NATIONAL GEOGRAPHIC SD NDTV GOODTIMES SD KIDS NICK SD NICK JR SD SONIC SD SONY YAY SD PUNJABI NEWS NEWS18 PB/HR/HP SD SPORTS STAR SPORTS 1 HINDI SD STAR SPORTS 2 SD STAR SPORTS 3 SD STAR SPORTS FIRST SD URDU NEWS NEWS18 URDU SD HATHWAY RECOMMENDED PACK DRP ₹ a (Excluding Tax) APNA CHOICE HINDI 275 275 ### (Pay Channels + Delhi FTA) SD 85 PAY CHANNELS HD 0 TOTAL: 85 LANGUAGE ~ GENRE CHANNEL NAME(S) CHANNEL TYPE ASSAMESE NEWS NEWS18 ASSAM/NE SD BHOJPURI GEC BIG GANGA SD ENGLISH MUSIC VH1 SD ENGLISH NEWS BBC WORLD NEWS SD CNBC TV18 SD CNN NEWS18 SD ET NOW SD INDIA TODAY SD MIRROR NOW SD NDTV 24X7 SD NDTV PROFIT SD TIMES NOW SD GUJARATI NEWS ZEE 24 KALAK SD HINDI GEC &TV
    [Show full text]