DVB – Digital Video Broadcasting Sicurezza Su Reti II

Total Page:16

File Type:pdf, Size:1020Kb

DVB – Digital Video Broadcasting Sicurezza Su Reti II DVB – Digital Video Broadcasting Sicurezza su Reti II Umberto Palo matr. 0521000836 Prof. Alfredo De Santis - 1 - Sommario CAPITOLO 1: Lo standard DVB per la televisione digitale terrestre.................................................. - 5 - 1.1 Introduzione ................................................................................................................... - 5 - 1.2 I vantaggi dello standard digitale .................................................................................... - 6 - 1.3 Analisi relativa all’introduzione e allo sviluppo della televisione digitale terrestre in Italia .- 8 - 1.3.1 Servizi e applicazioni ............................................................................................... - 8 - 1.4 Il ricevitore-decodificatore integrato e i sistemi riceventi di utente ................................. - 9 - 1.4.1 Il ricevitore-decodificatore integrato ....................................................................... - 9 - 1.4.2 Il decoder unico ...................................................................................................... - 9 - 1.4.3 I sistemi simulcrypt e multicrypt ............................................................................- 10 - 1.5 Standard ........................................................................................................................- 10 - 1.5.1 Standard trasmissivi ...............................................................................................- 10 - 1.5.2 Standard interattivi ................................................................................................- 12 - 1.5.3 Codifiche video ......................................................................................................- 12 - CAPITOLO 2 ..................................................................................................................................- 13 - 2.1 Introduzione ..................................................................................................................- 13 - 2.2 Tecniche di Compressione .............................................................................................- 13 - 2.2.1 L’algoritmo MPEG ..................................................................................................- 13 - 2.2.3 DVB – frame video .................................................................................................- 18 - CAPITOLO 3 ..................................................................................................................................- 20 - 3.1 Introduzione ..................................................................................................................- 20 - 3.2 Gli standard DVB ...........................................................................................................- 20 - 3.3 Schema di funzionamento generico DVB........................................................................- 22 - 3.3.1 Scrambling .............................................................................................................- 23 - 3.3.2 Descrambling .........................................................................................................- 26 - 3.4 Prestazioni e capacità trasmissiva ..................................................................................- 29 - 3.5 Le reti di diffusione in isofrequenza (SFN) ......................................................................- 30 - 3.6 Il sistema DVB-S (diffusione dei segnali numerici TV da satellitare ) ...............................- 32 - 3.7 Il sistema DVB-IP (diffusione di dati via satellite) ............................................................- 33 - 3.8 Il sistema DVB-MHP, adottato per la televisione digitale interattiva ...............................- 37 - 3.8.1 La piattaforma MHP ...............................................................................................- 37 - CAPITOLO 4: Sicurezza nel sistema DVB .......................................................................................- 39 - 4.1 Introduzione ..................................................................................................................- 39 - 4.2 Il sistema per l’accesso condizionato .............................................................................- 39 - - 2 - 4.3 Struttura CSA .................................................................................................................- 40 - 4.3.1 Dettagli algoritmo CSA ...........................................................................................- 42 - 4.4 Distribuzione delle chiavi – Gerarchia delle chiavi in un sistema CAS ..............................- 44 - 4.4.1 Gerarchia a due livelli.............................................................................................- 46 - 4.4.2 Gerarchia a tre livelli ..............................................................................................- 46 - 4.4.3 Gerarchia a quattro livelli .......................................................................................- 47 - 4.5 Tecniche di Scrambling ..................................................................................................- 49 - 4.5.1 Cut and Rotate .......................................................................................................- 50 - 4.5.2 Line Shuffle ............................................................................................................- 50 - Capitolo 5: Panoramica Codifiche DVB ......................................................................................- 52 - 5.1 Il sistema Irdeto .............................................................................................................- 52 - 5.1.1 la Smart card Irdeto ...................................................................................................- 52 - 5.1.2 Funzionamento in dettaglio di una smart card Irdeto .............................................- 52 - 5.2 Il sistema Seca ...............................................................................................................- 54 - 5.2.1 Breve storia ...........................................................................................................- 54 - 5.2.2 Gerarchia delle chiavi e comunicazione della smartcard .........................................- 55 - 5.3 Il sistema VideoGuard (NDS) in breve ............................................................................- 57 - CAPITOLO 6: .................................................................................................................................- 59 - 6.1. Introduzione ..................................................................................................................- 59 - 6.2. La pirateria della televisione a pagamento .....................................................................- 59 - 6.3. Breve storia della pirateria .............................................................................................- 61 - 6.4 Le tecniche per la visione abusiva ..................................................................................- 62 - 6.5 La Tecnica del Card-Sharing ...........................................................................................- 64 - 6.5.1 Come funziona .......................................................................................................- 65 - 6.5.2 Il Dreambox ...........................................................................................................- 65 - 6.6 Le Smart-card utilizzate nella pirateria ...........................................................................- 67 - 6.6.1 Programmare le Smart-card..........................................................................................- 72 - 6.7 I motivi del successo della pirateria ...............................................................................- 75 - 6.8 Proposte per combattere la pirateria. ............................................................................- 77 - 6.8.1 I successi contro la pirateria ...................................................................................- 78 - CAPITOLO 7: Il digitale terrestre in Italia........................................................................................- 81 - 7.1 Panorama legislativo attuale..........................................................................................- 81 - 7.2 Transizione da analogico a digitale .................................................................................- 81 - GLOSSARIO ...................................................................................................................................- 83 - Bibliografia ...................................................................................................................................- 88 - - 3 - - 4 - CAPITOLO 1: Lo standard DVB per la televisione digitale terrestre 1.1 Introduzione In questo primo capitolo, parleremo dei vantaggi dello standard digitale rispetto alla trasmissione analogica, vedremo un analisi relativa all’introduzione e allo sviluppo della televisione digitale terrestre in Italia guardando i servizi e le applicazioni offerte con il DVB. Verranno descritti in modo generico il ricevitore – decodificatore integrato e i sistemi riceventi di utente, si parle del decoder integrato, del decoder unico dei sistemi simulcript e multycript e saranno introdotto termini che saranno specializzati e approfonditi nel capitolo
Recommended publications
  • Fausto Emulator Options
    Fausto Emulator Options CS cards Client supported: CCCam (TCP) Gbox (UDP) Newcamd (TCP) RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Gbox Listener (localhost only, default ports) Twin Protocol (Serial) CS Cards server supported: Newcamd (TCP) & EMM Support RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Support: - Ethernet (linux box, diablo wifi,...) - SSSP/HSIC/TM Share/CSC (Serial) - Season Interface (Cams/box Readers) - Diablo Wireless (base unit) Main Functions: - Emulator - Logger - Net client - Card server - Cards support - DVB Plugins (without pctv card) Monitor: Datas Showed: *Ch.Infos : Package name or extra infos *Ecm *Caid *Provider ID *Key Index *Key Value *Control Word decoded With Fausto internal emulator keys.bin file is required or Fausto will work like logger show Datas but decoded nothing. To load keys.bin clic on icon Folder or drag file Keys.bin on window. When ecm receive, FE (Fausto emulator) try to decode, if success Datas color will be repaint in blue in others case stay red For ECM not decoded : *keys.bin not loaded *caid/provider/valid key not on file (provider not managed or keys expired) Fixed CW Checked: use Direct Control Word from keys.bin Tracker checked: log all datas receive under tab Tracker Monitor checked: Show all datas under Emulator window Clear Datas: clean all datas showed under monitor & wait next incoming ecm for refresh Exit: Close emulator window For Local menu: Press Mouse right clic Options under local popup menu (mouse right clic) FeKid: Load
    [Show full text]
  • DVB-T (La "T" Sta Per "Terrestrial"-"Terrestre")
    Facoltà di Scienze Matematiche Fisiche e Naturali Anno Accademico 2008/2009 Tesina di Sicurezza su Reti 2 Prof. Alfredo De Santis Studente: Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo Il Digital Video Broadcasting (DVB) •rappresenta un insieme di standard aperti ed accettati a livello internazionale •concepiti per lo sviluppo e la diffusione della televisione digitale •ha prodotto degli standard per ciascun mezzo trasmissivo (terrestre, satellite, via cavo): •DVB-S (la "S" sta per "Satellite") •DVB-C (la "C" per "Cable"-"Cavo") •DVB-T (la "T" sta
    [Show full text]
  • Alexander Installation and Configuration Guide
    Alexander installation and configuration guide. Contents 1. First time installation ................................................................................................... 2 2. Configuration ............................................................................................................... 5 2.1. Client Configuration ................................................................................................ 5 2.2. Server Settings ......................................................................................................... 6 2.3. System Settings ........................................................................................................ 8 2.4. Status Page ............................................................................................................. 10 2.5. Reboot .................................................................................................................... 11 2.6. Enter first time installation ..................................................................................... 11 2.7. Software download ................................................................................................ 12 3. LED information........................................................................................................ 14 4. Factory reset .............................................................................................................. 15 5. Trouble shooting .......................................................................................................
    [Show full text]
  • Dreambook Ver 2
    Dreambook for begyndere med dreamBoxen Kun til undervisningsbrug Du kan finde mere hjælp på chatten IRC server: skysnolimit-irc.net #ssf #digsat DreamBox DM7000 WWW.SSFTEAM.COM Indholdet er dels lavet af mig og andre på ssfteam.com/digsat.net og andet er fundet på nettet og oversat til dansk. Hvis du mener der er noget som ikke skal være her, så send mig (Alpha) en pm på vores forum www.ssfteam.com Indhold: Tekniske specifikationer om DreamBoxen......................................................................................3 Første image lægges ind på dreamBoxen........................................................................................6 Opsætning af netværk på DreamBoxen.........................................................................................13 Opsætning af Parabol med motor på DreamBoxen........................................................................14 Satellits Configuration med flere end fire LNB............................................................................18 Signalmåler med: Dreambox, Trådløs Laptop, Web-interface og DreamSet..................................21 Sikker måde at skifte img..............................................................................................................24 Flashwizard ver 5.2.......................................................................................................................25 EMU og hvilke mapper skal filerne i.............................................................................................29 De forskellige
    [Show full text]
  • NOMA 2017.Pdf
    SteklovMinistry of Mathematical Education and Science Institute of the Russian of theFederation RAS Institute of InformationNational Research Technologies, Lobachevsky State Mathematics University of Nizhni and Novgorod Mechanics of the National Research Lobachevsky State University of Nizhni Novgorod BOOKVESTNIK of ABSTRACTS OF LOBACHEVSKYThe Conference STATE NOMA-2017 UNIVERSITY is partiallyOF supported NIZHNI by NOVGOROD the Russian Foundation for Basic Research, grant No 17-01-20264 No. 2 Nizhni Novgorod Nizhni Novgorod University Press 20217 1 Vestnik of Lobachevsky State University of Nizhni Novgorod. No. 2. – Nizhni Novgorod: Nizhni Nov- gorod University Press, 2017. – 256 pp. The journal appears six times a year Editor-in-Chief Martynov A.V. D.Sc.(Law), Assoc.Prof. Editorial Council: Martynov A.V., D.Sc.(Law), Assoc.Prof., UNN (Chairman); Kuznetsov A.A., D.Sc.(History), Assoc.Prof., UNN (DeputyThe ChairmanConference); Ruchina NOMA-2017: L.I., Cand.Sc. Book(Philology of ),abstracts. Assoc. Prof. - ,Nizhni UNN (Deputy Novgorod: Chairman Nizhni); Gorbatova Novgorod M.K., LobachevskyCand.Sc.(Law ),State Assoc.Prof. University,, UNN 2017.(Executive - 72 Secretary р. of the Editorial Council); Avrutin Yu.E., D.Sc.(Law), Prof., St.Petersburg University of the Ministry of Internal Affairs of the Russian Federation (St.Petersburg); ISBNAnd 978-5-91326-399-5reev S.N., D.Sc.(Philology), Prof., Smolensk State University (Smolensk); Belokrenitsky V.Ya., D.Sc.(History), Prof., RAS Institute of Oriental Studies (Moscow); Gracheva E.Yu., D.Sc.(Law), Prof., Kutafin Moscow State Law Academy (Moscow); Egorova M.A., D.Sc.(Law), Assoc. Prof., Russian Presidential Academy of National Economy and Public Administration (Moscow); Karasik V.I., D.Sc.(Philology), Prof., Volgograd Social Scientific,and Pedagogical Programme University (Volgograd Committee); Kolesnikova M.E., D.Sc.(History), Prof., North Caucasus Federal University (Stavropol); Kosach G.G., D.Sc.(History), Prof., Russian State University for the Humanities (Mos- Dmitriicow); Lebedeva V.
    [Show full text]
  • QUICC Code Solutions for the Powerquicc ® II And
    Freescale Semiconductor QUICC_CODESPB Product Brief Rev. 0, 06/2005 QUICC Code Solutions for the PowerQUICC II™ and PowerQUICC III™ Families For access and edge infrastructure equipment, end Contents manufacturers need to protect their hardware and software 1. Overview . 2 2. Enhanced SS7 (ESS7) . 3 investment in already installed equipment while enduring 3. Enhanced AAL2 (EAAL2) . 4 the arduous task of supporting evolving protocol standards. 4. Multi Service Platform (MSP) . 5 Rising to meet this challenge, Freescale offers a range of 5. Fast Data Switching (FDS) . 6 6. Point-to-Point (PPP) Microcode . 8 QUICC code solutions that reduce the need for hardware 7. Summary . 10 design changes and instead provide seamless software 8. Revision History . 10 upgrades. A. Supported QUICC Code Packages . 10 © Freescale Semiconductor, Inc., 2005. All rights reserved. Overview 1Overview The PowerQUICC II (PQ2) and PowerQUICC III (PQ3) range of communications processors include an integrated communications processor module (CPM) or RISC microcontroller which can support downloadable RAM-based microcodes referred to as QUICC codes. QUICC codes enhance the wealth of field proven layer 2 protocol (ATM, Ethernet, HDLC and PPP based) software support available today on the CPM. They provide equipment manufacturers with a seamless software upgrade to support evolving protocol standards using existing PQ2 and PQ3 hardware-based designs Figure 1 shows the layer 2 software protocols supported today on the CPM with configurable device API drivers and initialization
    [Show full text]
  • CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 for CSCIP Applicant Use Only
    Module 6: Smart Card Usage Models – Mobile, NFC and Pay TV Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • Índice General
    AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación..........................................................................................................
    [Show full text]
  • Modeling of Artificial Intelligence, 2014, Vol.(3), № 3
    Modeling of Artificial Intelligence, 2014, Vol.(3), № 3 Modeling Modeling of Artificial Intelligence Has been issued since 2014. ISSN 2312-0355 2014. Vol.(3). № 3. Issued 4 times a year EDITORIAL STAFF Simonyan Arsen – Sochi State University, Sochi, Russian Federation (Editor-in-Chief) Dreizis Yurii – Sochi State University, Sochi, Russian Federation Makarova Irina – Sochi State University, Sochi, Russian Federation Simavoryan Simon – Sochi State University, Sochi, Russian Federation Ulitina Elena – Sochi State University, Sochi, Russian Federation EDITORIAL BOARD Dr. Belyavskii Grigorii – Southern Federal University, Rostov-on-Don, Russian Federation Dr. Chitsyan Robert – Armenian National Agrarian University, Yerevan, Armenia Dr. Oganyan Viktor – Yerevan State University, Yerevan, Armenia Dr. Popov Georgii – Astrakhan State Technical University, Astrakhan, Russian Federation Dr. Ravindranath Cherukuri – Gyan Ganga Institute of Technology and Management, Gyan Ganga, India Dr. Saakyan Vladimir – Institute for Informatics and Automation Problems of the National Academy of Sciences, Yerevan, Armenia Dr. Yicong Zhou – University of Macau, Macau, China The journal is registered by Federal Service for Supervision of Mass Media, Communications and Protection of Cultural Heritage (Russia). Registration Certificate ПИ № ФС77-57043 25.02.2014. ing of Artificial Intelligence Journal is indexed by: CiteFactor, CrossRef, EBSCOhost Electronic Jornals Service, Journal Index, Научная электронная библиотека, Open Academic Journals Index, Sherpa Romeo. Model All manuscripts are peer reviewed by experts in the respective field. Authors of the А manuscripts bear responsibility for their content, credibility and reliability. Editorial board doesn’t expect the manuscripts’ authors to always agree with its opinion. 2014 Postal Address: 26/2 Konstitutcii, Office 6 Passed for printing 15.09.14. 354000 Sochi, Russian Federation Format 21 29,7/4.
    [Show full text]
  • By Madumelu Kelvin 19/Sci01/097
    BY MADUMELU KELVIN 19/SCI01/097 1. An input device in simple words is one that helps the computer get the data from the user and enters it in the computing system. An output device in simple words is the one that helps the computer to display the data and results after the process completes. 2. The main type of input devices includes a Keyboard, Image Scanner, Microphone. Pointing device. Graphics tablet. Joystick. Light pen. Mouse. Optical. Pointing stick. Touchpad. Touchscreen. Trackball. Webcam. Softcam and Refreshable braille display. 3. The main type of output devices includes Monitor. (LED, LCD, CRT, etc.), Printers of all kinds, Plotters, Projector, LCD Projection Panels, Computer Output Microfilm (COM), Speaker and Head Phone. 4. An input device takes the data from the user and then sends it to the processor for further steps, whereas an output device takes the data from the processor after the actions complete and then sends it back to the user. 5. Input devices are more complicated as they have complex coding the ensures that the user can interact with the computer correctly whereas the output devices are simpler for the user since they only see the results and do not have to learn the processes Examples of input devices; Keyboard, Image Scanner, Microphone, Pointing device, Graphics tablet, Joystick mouse. Examples of output devices; Monitor, Printers of all kinds, Plotters, Projector, LCD Projection Panels, Computer Output Microfilm, Speakers. .
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]
  • Feature #2056 Tvheadend: Add Support for CI+ Cams 2014-04-13 19:52 - Raymond Paulsen
    Tvheadend - Feature #2056 Tvheadend: Add support for CI+ Cams 2014-04-13 19:52 - Raymond Paulsen Status: New Start date: 2017-01-03 Priority: Normal Due date: Assignee: % Done: 100% Category: Descrambling Estimated time: 0.00 hour Target version: Description It would have been nice to see tvheadend with support for CI+ cams, Vdr and mythtv has this kind of support. at some time in the future this support will be needed. Forum thread for discussion: https://tvheadend.org/boards/5/topics/11529 Subtasks: Feature # 4160: CI+ cam status? Rejected History #1 - 2014-04-14 02:17 - Hanspeter Müller Raymond Paulsen wrote: It would have been nice to see tvheadend with support for CI+ cams, Vdr and mythtv has this kind of support. Errrrr, no, they don't, they have support for CI. There is no opensource implementation of any CI+, sadly, and it's unlikey that this is gonna ever happen officially (the whole purpose of the "+" are restrictions, which cannot be enforced if "those smelly bearded opensource hippies" could access the tv-programs) sad.png If you meant "simple CI-Hardware-CAMs", there are multiple threads and bugs about this, the summary (how i understood it): Would be nice, but not gonna happen anytime soon, there's noone with the know-how and time in the core-team to implement it. Depending on how much you (and others) want this, maybe a Kickstarter-Style bounty would be the way to go... #2 - 2014-04-14 04:08 - Raymond Paulsen Hanspeter Müller wrote: Raymond Paulsen wrote: It would have been nice to see tvheadend with support for CI+ cams, Vdr and mythtv has this kind of support.
    [Show full text]