Índice General

Total Page:16

File Type:pdf, Size:1020Kb

Índice General AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación........................................................................................................... 13 2.2 DVB.......................................................................................................13 2.2.1 Common Scrambling Algorithm (CSA) .......................................................... 14 2.2.1.1 Cifrador en flujo...................................................................................................... 15 2.2.1.2 Cifrador en bloque .................................................................................................. 16 2.3 Algunos sistemas CA propietarios ........................................................16 2.3.1 VideoGuard ...................................................................................................... 16 2.3.2 Nagravision ...................................................................................................... 17 2.3.3 Irdeto Access.................................................................................................... 19 2.3.4 Conax ............................................................................................................... 19 2.3.5 Viaccess............................................................................................................ 20 2.4 Piratería..................................................................................................21 2.4.1 Mercado de la piratería de la televisión de pago en la UE............................... 21 2.4.2 Atractivo del Mercado de la piratería de la televisión de pago........................ 22 2.4.3 Efectos económicos de la piratería de la televisión de pago............................ 22 2.4.3.1 En los proveedores de CAS .................................................................................... 22 i 2.4.3.2 En los proveedores de televisión de pago ............................................................... 23 2.4.4 Clasificación de los piratas en diferentes grupos ............................................. 23 2.4.5 Ataques............................................................................................................. 24 2.4.5.1 Comunidad Black Hat............................................................................................. 25 2.4.5.2 Ataques sin tarjeta................................................................................................... 25 2.4.5.3 Tarjeta compartida (Card Sharing) ......................................................................... 26 2.4.6 Medidas anti-piratería utilizadas ...................................................................... 27 2.4.7 Medidas anti-piratería propuestas .................................................................... 28 2.4.8 Traitor tracing................................................................................................... 29 3 Broadcast Encryption ................................................................................ 31 3.1 Introducción...........................................................................................31 3.2 Algoritmos Stateless..............................................................................33 3.2.1 Esquemas en forma de árbol ............................................................................ 34 3.2.1.1 Complete Subtree (CS) ........................................................................................... 35 3.2.1.2 Subset Difference (SD)........................................................................................... 38 3.2.1.3 Layered Subset Difference (LSD) .......................................................................... 43 3.2.1.4 Seguridad ................................................................................................................ 45 3.2.2 Esquemas con estructura lineal ........................................................................ 46 3.2.2.1 Basic Chain Scheme (BCS) .................................................................................... 47 3.2.2.2 C-basic Chain Scheme (CBCS) .............................................................................. 49 3.2.2.3 Seguridad ................................................................................................................ 51 3.2.2.4 Skipping Chain Scheme (SCS) ............................................................................... 51 3.3 Resumen comparativo de los BES estudiados ......................................56 4 Análisis......................................................................................................... 58 4.1 Seguridad de los CAS............................................................................58 4.1.1 Servicios de seguridad...................................................................................... 58 4.1.2 Clasificación de los mecanismos de seguridad ................................................ 61 4.1.3 Algoritmos criptográficos usados en la distribución de claves........................ 62 4.1.4 Comunicación receptor – smart card............................................................... 68 4.1.4.1 Análisis del método propuesto................................................................................ 72 4.1.5 Rupturas de CAS (caso concreto de Nagra 2).................................................. 73 4.2 Comparativa entre el CAS y los BES....................................................78 ii 4.2.1 Simulación........................................................................................................ 79 4.2.2 Resultados ........................................................................................................ 80 4.3 Implantación del BE en los CAS actuales.............................................91 4.3.1 Primer esquema propuesto ............................................................................... 91 4.3.2 Segundo esquema propuesto ............................................................................ 93 5 Advanced Access Content System (AACS).............................................. 98 5.1 Antecesores............................................................................................99 5.2 Cifrado y descifrado de medios pre-grabados.......................................99 5.3 Autenticación de la Unidad y el host mediante acuerdo de clave.......105 5.3.1 Protocolo de autenticación mutua y protocolo de acuerdo de clave .............. 106 5.3.2 Descripción del esquema de autenticación del AACS Unidad-Host ............. 106 5.3.3 Análisis del esquema de autenticación del AACS unidad-host ..................... 107 5.4 La seguridad del AACS en el mundo real...........................................108 6 Conclusiones..............................................................................................110 7 Glosario de términos ................................................................................113 8 Referencias ................................................................................................115 9 Anexos........................................................................................................121 9.1 Algoritmos de cifrado..........................................................................121 9.1.1 DES (Data Encryption Standard) ................................................................... 121 9.1.2 Triple DES......................................................................................................123 9.1.3 IDEA (Internacional Data Encryption Algorithm)......................................... 124 9.1.4 AES (Advanced Encryption Standard) .......................................................... 126 9.1.5 RSA (Rivest Shamir Adleman)...................................................................... 130 9.2 Modos de Operación para Algoritmos de Cifrado por Bloques..........132 9.2.1 Modo ECB...................................................................................................... 132 9.2.2 Modo CBC....................................................................................................
Recommended publications
  • Fausto Emulator Options
    Fausto Emulator Options CS cards Client supported: CCCam (TCP) Gbox (UDP) Newcamd (TCP) RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Gbox Listener (localhost only, default ports) Twin Protocol (Serial) CS Cards server supported: Newcamd (TCP) & EMM Support RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Support: - Ethernet (linux box, diablo wifi,...) - SSSP/HSIC/TM Share/CSC (Serial) - Season Interface (Cams/box Readers) - Diablo Wireless (base unit) Main Functions: - Emulator - Logger - Net client - Card server - Cards support - DVB Plugins (without pctv card) Monitor: Datas Showed: *Ch.Infos : Package name or extra infos *Ecm *Caid *Provider ID *Key Index *Key Value *Control Word decoded With Fausto internal emulator keys.bin file is required or Fausto will work like logger show Datas but decoded nothing. To load keys.bin clic on icon Folder or drag file Keys.bin on window. When ecm receive, FE (Fausto emulator) try to decode, if success Datas color will be repaint in blue in others case stay red For ECM not decoded : *keys.bin not loaded *caid/provider/valid key not on file (provider not managed or keys expired) Fixed CW Checked: use Direct Control Word from keys.bin Tracker checked: log all datas receive under tab Tracker Monitor checked: Show all datas under Emulator window Clear Datas: clean all datas showed under monitor & wait next incoming ecm for refresh Exit: Close emulator window For Local menu: Press Mouse right clic Options under local popup menu (mouse right clic) FeKid: Load
    [Show full text]
  • Channel Switching-Triggered Charging for Pay-TV Over IPTV
    Channel Switching-Triggered Charging for Pay-TV over IPTV vom Fachbereich Informatik der Technischen Universitat¨ Darmstadt genehmigte Dissertation zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr.-Ing.) von Dipl.-Inform. Tolga Arul geboren in Frankfurt am Main, Deutschland Referenten der Arbeit: Prof. Dr. Sorin A. Huss Technische Universitat¨ Darmstadt Asst. Prof. Dr. Abdulhadi Shoufan Khalifa University Abu Dhabi Prof. Dr. Stefan Katzenbeisser Technische Universitat¨ Darmstadt Tag der Einreichung: 18.08.2016 Tag der mundlichen¨ Prufung:¨ 06.10.2016 Darmstadter¨ Dissertation D 17 Darmstadt 2017 EHRENWÖRTLICHE ERKLÄRUNG Hiermit versichere ich, die vorliegende Arbeit ohne Hilfe Dritter und nur mit den ange- gebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus den Quellen entnommen wurden, sind als solche kenntlich gemacht worden. Diese Arbeit hat in glei- cher oder ahnlicher¨ Form noch keiner Prufungsbeh¨ orde¨ vorgelegen. Darmstadt, 18. August 2016 Tolga Arul CHANNEL SWITCHING-TRIGGERED CHARGING FOR PAY-TV OVER IPTV To my family CONTENTS List of Figures vii List of Tables xi Acknowledgments xv Acronyms xvii 1 Introduction1 1.1 Context2 1.1.1 Pricing for Information Goods4 1.1.2 Charging Models for Pay-TV7 1.2 Short-Interval Charging 10 1.2.1 Consumer Opportunities 10 1.2.2 Consumer Challenges 11 1.2.3 Network Operator Opportunities 12 1.2.4 Network Operator Challenges 14 1.3 Objectives and Organization 15 2 Prospects 19 2.1 Market Participants 20 2.2 Market Background 21 2.3 Consumer Perspective
    [Show full text]
  • An Overview of Multimedia Content Protection in Consumer Electronics Devices
    An overview of multimedia content protection in consumer electronics devices Ahmet M. Eskicioglu* and Edward J. Delp‡ *Thomson Consumer Electronics Corporate Research 101 W. 103rd Street Indianapolis, Indiana 46290-1102 USA ‡ Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue University West Lafayette, Indiana 47907-1285 USA ABSTRACT A digital home network is a cluster of digital audio/visual (A/V) devices including set-top boxes, TVs, VCRs, DVD players, and general-purpose computing devices such as personal computers. The network may receive copyrighted digital multimedia content from a number of sources. This content may be broadcast via satellite or terrestrial systems, transmitted by cable operators, or made available as prepackaged media (e.g., a digital tape or a digital video disc). Before releasing their content for distribution, the content owners may require protection by specifying access conditions. Once the content is delivered to the consumer, it moves across home the network until it reaches its destination where it is stored or displayed. A copy protection system is needed to prevent unauthorized access to bit streams in transmission from one A/V device to another or while it is in storage on magnetic or optical media. Recently, two fundamental groups of technologies, encryption and watermarking, have been identified for protecting copyrighted digital multimedia content. This paper is an overview of the work done for protecting content owners’ investment in intellectual property. Keywords: multimedia, copy protection, cryptography, watermarking, consumer electronics, digital television, digital video disc, digital video cassette, home networks. 1. INTRODUCTION In the entertainment world, original multimedia content (e.g., text, audio, video and still images) is made available for consumers through a variety of channels.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009
    DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009 Week 6 – Class Notes Optical Disc Media: CD and DVD Optical Disc Media Design of Optical Media Most optical storage systems store data across the surface of a flat disc. This allows random access of data, as well as ease of manufacturing replication. Because the data is written and read via optical means, there is no physical contact between the media and the pickup. This ensures long media and pickup life and minimizes damage through head crashes or other failures. In addition, a protective layer can be used to protect the data from damages or contamination. Also, multiple data layers can be places within one substrate. Nonetheless, stored data must undergo both modulation and error correction. Data can be stored either along a spiral or concentric tracks. Most optical disc pickups shine a laser on the medium, and the reflected light is detected by a sensor and decoded to recover the carried data. The medium must have two states so that the change between them varies with the reflected light. Data can be represented as a phase change, polarization change, or change in the intensity of reflected light. The resulting variations picked up from the media can be converted into a varying electrical signal for data recovery. Laser beams, having a short wavelength, allow for high information data density and a high SNR needed for a high bit rate. Optical media must be supported by a sophisticated servo system to provide positioning, tracking, focusing of the pickup, and accurate rotation.
    [Show full text]
  • DVB-T (La "T" Sta Per "Terrestrial"-"Terrestre")
    Facoltà di Scienze Matematiche Fisiche e Naturali Anno Accademico 2008/2009 Tesina di Sicurezza su Reti 2 Prof. Alfredo De Santis Studente: Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo Il Digital Video Broadcasting (DVB) •rappresenta un insieme di standard aperti ed accettati a livello internazionale •concepiti per lo sviluppo e la diffusione della televisione digitale •ha prodotto degli standard per ciascun mezzo trasmissivo (terrestre, satellite, via cavo): •DVB-S (la "S" sta per "Satellite") •DVB-C (la "C" per "Cable"-"Cavo") •DVB-T (la "T" sta
    [Show full text]
  • RECE\VED Tio~ , 0 \992
    DECTEC INTERNATIONAL INC. P.D. BOX 2275, 1 962 MILLS ROAD, SIDNEY, BRITISH COLUMBIA, CANADA VBL 3SB PHONE: (604) 655-4463 . ._.... FAX: (604) 655-3906 RECE\VED tiO~ , 0 \992 • COMMISSION ftDEkAL coMMUNICATIONS y OFF:"Ir.E OF THE SECRETAR October 8, 1991 RECEIVED OCT 15 IY9, Ms Donna Searcy Secretary, Federal Communications Commission FCC M/' 1919 M Street ,.,IL BRANCH Washington, DC 20515 Dear Ms. Searcy, This letter is presented in support of a filing submitted to the Commission by the Consumer Satellite Coalition on July 1, 1991. The document filed by the CSC requested a public hearing/inquiry on the monopolistic business practices of General Instrument Corporation and the distribution and sale to consumers by the General Instrument division of Forstmann Little Corporation of a defective descrambling product which is used by consumers and cable operators to unscramble programming delivered over satellite. As a research and development firm which has spent the past three years developing a universal scrambling system designed to run multiple encryption and decryption processes through one single decoder, we submit that General Instrument has deceived the pUblic, the governments of the united States and Canada, television programmers, hollywood producers, satellite and consumer electronic retailers, and the manufacturers of Integrated Receiver Descramblers in the sales and upgrade programs associated with its videocipher II scrambling system, (exhibit A). Through our work as a well-respected research and development company who has been
    [Show full text]
  • Final Draft ETSI EN 300 000 V0.0.0
    Digital Video Broadcasting (DVB); Specification for Service Information (SI) in DVB systems DVB Document A038 December 2017 This page is left intentionally blank 3 Final draft ETSI EN 300 468 V1.16.1 (2017-06) Contents Intellectual Property Rights ................................................................................................................................ 8 Foreword............................................................................................................................................................. 8 Modal verbs terminology ................................................................................................................................... 8 1 Scope ........................................................................................................................................................ 9 2 References ................................................................................................................................................ 9 2.1 Normative references ......................................................................................................................................... 9 2.2 Informative references ..................................................................................................................................... 12 3 Definitions and abbreviations ................................................................................................................. 12 3.1 Definitions ......................................................................................................................................................
    [Show full text]
  • Copyright and DRM
    CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought over pornography, neo-Nazism, bomb design, blasphemy, or political dissent. Instead, the Armageddon of digital control, the real death match between the Party of the Past and Party of the Future, will be fought over copyright. — John Perry Barlow Be very glad that your PC is insecure — it means that after you buy it, you can break into it and install whatever software you want. What YOU want, not what Sony or Warner or AOL wants. — John Gilmore 22.1 Introduction Copyright, and digital rights management (DRM), have been among the most contentious issues of the digital age. At the political level, there is the conflict alluded to by Barlow in the above quotation. The control of information has been near the centre of government concerns since before William Tyndale (one of the founders of the Cambridge University Press) was burned at the stake for printing the Bible in English. The sensitivity continued through the estab- lishment of modern copyright law starting with the Statute of Anne in 1709, through the eighteenth century battles over press censorship, to the Enlight- enment and the framing of the U.S. Constitution. The link between copyright and censorship is obscured by technology from time to time, but has a habit of reappearing. Copyright mechanisms exist to keep information out of the hands of people who haven’t paid for it, while censors keep information out of the hands of people who satisfy some other criterion.
    [Show full text]
  • DVD CCA and AACS LA
    David Taylor for DVD CCA and AACS LA Please submit a separate comment for each proposed class. [ ] Check here if multimedia evidence is being provided in connection with this comment ITEM A. COMMENTER INFORMATION DVD Copy Control Association The DVD Copy Control Association (“DVD CCA”), a not-for-profit corporation with its principal office in Morgan Hill, California, licenses the Content Scramble System (“CSS”) for use in protecting against unauthorized access to or use of prerecorded video content distributed on DVD discs. Its licensees include the owners of such content and the related authoring and disc replicating companies; producers of encryption engines, hardware and software decrypters; and manufacturers of DVD players and DVD-ROM drives. Advanced Access Content System Licensing Administrator The Advanced Access Content System Licensing Administrator, LLC (“AACS LA”), is a cross-industry limited liability company with its principal offices in Beaverton, Oregon. The Founders of AACS LA are Warner Bros., Disney, Microsoft, Intel, Toshiba, Panasonic, Sony, and IBM. AACS LA licenses the Advanced Access Content System (“AACS”) technology that it developed for the protection of high-definition audiovisual content distributed on optical media. That technology is associated with Blu-ray Discs. AACS LA’s licensees include the owners of such content and the related authoring and disc replicating companies; producers of encryption engines, hardware and software decrypters; and manufacturers of Blu-ray disc players and Blu-ray disc drives. i As ultra-high-definition products are entering the marketplace, AACS LA has developeD a separate technology for the distribution of audiovisual content in ultra-high definition digital format.
    [Show full text]
  • Alexander Installation and Configuration Guide
    Alexander installation and configuration guide. Contents 1. First time installation ................................................................................................... 2 2. Configuration ............................................................................................................... 5 2.1. Client Configuration ................................................................................................ 5 2.2. Server Settings ......................................................................................................... 6 2.3. System Settings ........................................................................................................ 8 2.4. Status Page ............................................................................................................. 10 2.5. Reboot .................................................................................................................... 11 2.6. Enter first time installation ..................................................................................... 11 2.7. Software download ................................................................................................ 12 3. LED information........................................................................................................ 14 4. Factory reset .............................................................................................................. 15 5. Trouble shooting .......................................................................................................
    [Show full text]
  • En 300 468 V1.14.1 (2014-05)
    ETSI EN 300 468 V1.14.1 (2014-05) European Standard Digital Video Broadcasting (DVB); Specification for Service Information (SI) in DVB systems 2 ETSI EN 300 468 V1.14.1 (2014-05) Reference REN/JTC-DVB-329 Keywords broadcasting, digital, DVB, MPEG, service, TV, video ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]