Conditional Access (CA)

Total Page:16

File Type:pdf, Size:1020Kb

Conditional Access (CA) Netzsicherheit Teil 6: Pay-TV Prof. Dr. Jörg Schwenk Lehrstuhl für Netz- und Datensicherheit Gliederung . Funktionsweise Conditional Access (CA) . Angriffe auf das analoge Scrambling . Videocrypt (BSkyB Analog) . Nagravision (Premiere Analog) . Angriffe auf das Schlüsselmanagement . Videocrypt . Irdeto/BetaResearch . Digitales Fernsehen und der Common Scrambling Algorithmus . MPEG-2 Transportformat und DVB . Der CSA . Broadcast Encryption . Traitor Tracing . Kurzeinführung „Digital Watermarking“ Pay-TV Jörg Schwenk 2 Lehrstuhl für Netz- und Datensicherheit Ziele Conditional Access Autorisierter Benutzer Nichtautorisierter Benutzer Autorisierter Benutzer Pay-TV Jörg Schwenk 3 Lehrstuhl für Netz- und Datensicherheit Funktionsweise Conditional Access Audio/Video verschlüsselt + Zugriffsbedingungen (in ECM) CNN 2 Überprüfe, ob die Zugriffs- rechte mit den Zugriffsbedin- gungen übereinstimmen. Zugriffs- Wenn ja, entschlüssele! Rechte Pay-TV Jörg Schwenk 4 Lehrstuhl für Netz- und Datensicherheit Funktionsweise Conditional Access . Scrambling / Verschlüsselung . Analog: Das Videosignal wird in einen FIFO-Puffer geladen und unter Kontrolle eines kryptograph. Schlüssels CW modifiziert. Digital: Der MPEG-2-TS wird durch den DVB Common Scrambling-Algorithmus mit dem Schlüssel („Kontrollwort“) CW verschlüsselt. Schlüsselmanagement / Conditional Access . CW wird (verschlüsselt mit einem Service-Schlüssel SK) in einer ECM übertragen, zusammen mit Zugriffsbedingungen. SK wird (verschlüsselt mit einem persönlichen Schlüssel PK oder einem Gruppenschlüssel GK) in einer EMM übertragen, zusammen mit Zugriffsrechten. Stimmen Bedingungen und Rechte überein, so gibt die Chipkarte CW frei. Pay-TV Jörg Schwenk 5 Lehrstuhl für Netz- und Datensicherheit Scrambling / Conditional Access Pay-TV-Anbieter Kunde Video CSA CSACW(Video) CSA Video Scrambling CW CA CW E D E D Pay-TV Jörg Schwenk 6 Lehrstuhl für Netz- und Datensicherheit Scrambling / Conditional Access Pay-TV-Anbieter Kunde Video CSA CSACW(Video) CSA Video Scrambling CW CA CW ECM = ESK(CW) E D SK SK E D Pay-TV Jörg Schwenk 7 Lehrstuhl für Netz- und Datensicherheit Scrambling / Conditional Access Pay-TV-Anbieter Kunde Video CSA CSACW(Video) CSA Video Scrambling CW CA CW ECM = ESK(CW) E D SK SK EMM = E (SK) E PK D PK PK Pay-TV Jörg Schwenk 8 Lehrstuhl für Netz- und Datensicherheit Verschlüsselung im „Consumer Electronics“-Bereich . Neue, sehr spezifische Bedrohungen . Der einzelne Kunde hat kein Interesse daran, seine kryptographischen Schlüssel (SK, GK, PK) geheimzuhalten. Marketingstrategien und Sicherheitsanforderungen sind oft unvereinbar. Geräte und Chipkarten werden preisgünstig und unkontrollierbar abgegeben. Großes Potential an versierten Hackern mit „einfachen“, aber effektiven Angriffen. Frühestes Beispiel für „Seitenkanalangriffe“ in der Praxis . Forschungsgebiet seit 2006: Rational Cryptography . Angreifer sind nicht per Definition „böse“, sondern jeder Teilnehmer kann abhängig von einer „Gewinnfunktion“ gut oder böse sein. Pay-TV Jörg Schwenk 9 Lehrstuhl für Netz- und Datensicherheit Gliederung . Funktionsweise Conditional Access (CA) . Angriffe auf das analoge Scrambling . Videocrypt (BSkyB Analog) . Nagravision (Premiere Analog) . Angriffe auf das Schlüsselmanagement . Videocrypt . Irdeto/BetaResearch . Digitales Fernsehen und der Common Scrambling Algorithmus . MPEG-2 Transportformat und DVB . Der CSA . Broadcast Encryption . Traitor Tracing . Kurzeinführung „Digital Watermarking“ Pay-TV Jörg Schwenk 10 Lehrstuhl für Netz- und Datensicherheit Scrambling / Conditional Access Pay-TV-Anbieter Kunde Video CSA CSACW(Video) CSA Video Scrambling CW CA CW ECM = ESK(CW) E D SK SK EMM = E (SK) E PK D PK PK Pay-TV Jörg Schwenk 11 Lehrstuhl für Netz- und Datensicherheit Videocrypt Pay-TV Jörg Schwenk 12 Lehrstuhl für Netz- und Datensicherheit Mehr Infos zu Videocrypt Pay-TV Jörg Schwenk 13 Lehrstuhl für Netz- und Datensicherheit Nagravision/Syster Pay-TV Jörg Schwenk 14 Lehrstuhl für Netz- und Datensicherheit Mehr Infos zu Nagravision/Syster Pay-TV Jörg Schwenk 15 Lehrstuhl für Netz- und Datensicherheit Nagravision/Syster . Angriffe auf das analoge Scrambling . Der PSND1-Dekoder für die SECAM-Version des Nagravision-Systems rekonstruiert(e) gescrambeltes Audio/Video in Echtzeit. Quelle: http://www.eurosat.com/eurosat/nagra/psnd1-e.html Pay-TV Jörg Schwenk 16 Lehrstuhl für Netz- und Datensicherheit Nagravision/Syster Angriffe auf das analoge Scrambling (2): PC-Basierte Angriffe . Pentium 166 Mhz . Videokarte mit „Framegrabber“ . Funktioniert für Nagravision/Syster und Videocrypt . Illegal bei Entschlüsselung deutscher Sender Quellen: http://www.multimania.com/freetw/help/freetv.htm; http://www.leodom-gruppe.de/wissenschaft/decodieren.htm Pay-TV Jörg Schwenk 17 Lehrstuhl für Netz- und Datensicherheit Gliederung . Funktionsweise Conditional Access (CA) . Angriffe auf das analoge Scrambling . Videocrypt (BSkyB Analog) . Nagravision (Premiere Analog) . Angriffe auf das Schlüsselmanagement . Videocrypt . Irdeto/BetaResearch . Digitales Fernsehen und der Common Scrambling Algorithmus . MPEG-2 Transportformat und DVB . Der CSA . Broadcast Encryption . Traitor Tracing . Kurzeinführung „Digital Watermarking“ Pay-TV Jörg Schwenk 18 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement/CA Pay-TV-Anbieter Kunde Video CSA CSACW(Video) CSA Video Scrambling CW CA CW ECM = ESK(CW) E D SK SK EMM = E (SK) E PK D PK PK Pay-TV Jörg Schwenk 19 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement Videocrypt Deaktivierung einer Chipkarte durch „negative Adressierung“ EMM=ECM CW . Alle Karten besitzen das gleiche „Geheimnis“ . Deaktivierung einer Hash Karte nur in Kooperation mit dieser möglich . Folge: MAC Okay? . „Infinite Life“-Attacke . Descrambling ohne Chipkarte möglich Adr1 Adr2 Adr3 Adr4 Pay-TV Jörg Schwenk 20 Lehrstuhl für Netz- und Datensicherheit Geschichte der Videocrypt-Hacks 2.24 The *REAL* History of Hacks On VideoCrypt . 2.24a Hack 01: The McCormac Hack . 2.24b Hack 02: The Infinite Lives Hack Quelle: . 2.24c Hack 03: The KENtucky Fried Chip Hack . 2.24d Hack 04: The 07 Ho Lee Fook (8752/8051) http://www.iol.ie/~kooltek/faq.html, . 2.24e Hack 05: The 07 Ho Lee Fook (PIC16C54) 16.8.97 . 2.24f Hack 06: The 07 Ho Lee Fook (PIC16C84) . 2.24g Hack 07: The 07 Season Program . 2.24h Hack 08: The 09 Ho Lee Fook (temporary) . 2.24i Hack 09: The Phoenix / Genesis Blocker . 2.24j Hack 10: The Stable 09 Ho Lee Fook . 2.24k Hack 11: The 09 Battery Card . 2.24l Hack 12: The 09 Season Program . 2.24m Hack 13: The Sam Chisum Hack On Sky 10 PPV . 2.24n Hack 14: The Sky 10 Commercial Phoenix Hack . 2.24o Hack 15: The Megatek 10 Battery Card . 2.24p Hack 16: The Judgment Night PPV Hack . 2.24q Hack 17: The Christmas 1996 Phoenix . 2.24r Hack 18: Season 10 . 2.24s Hack 19: Phoenix 3.50 . 2.24t Hack 20: SkyPIC 10 . 2.24u Hack 21: Sky 10/11 Blocker Pay- TV Jörg Schwenk 21 Lehrstuhl für Netz- und Datensicherheit CA im Entertainment-Bereich . Angriffe auf das Schlüsselmanagement . Blocker filtern Befehle zum Deaktivieren der Chipkarte aus. Pay-TV Jörg Schwenk 22 Lehrstuhl für Netz- und Datensicherheit Videocrypt-Hacks: Der Season-Hack Der „geheime“ PRF-Algorithmus wurde im PC nachpro- grammiert Kerkhoffs ! Pay-TV Jörg Schwenk 23 Lehrstuhl für Netz- und Datensicherheit Videocrypt-Hacks: Der Lötkolben-Hack Quelle: M. Kuhn Pay-TV Jörg Schwenk 24 Lehrstuhl für Netz- und Datensicherheit Sicherheit von NDS VideoGuard: Komplexität des ASIC The best technology available. Custom-designed hardware components include NDS- specific circuits based on high density components to prevent device analysis and re-engineering. http://www.nds.com/ conditional_access/ videoguard_security.html Pay-TV Jörg Schwenk 25 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement Eurocrypt (Nagra, Canal+, Viaccess, ...) Aktivierung einer Chipkarte durch „positive Adressierung“ CW . ECM wird mit SK ECM verschlüsselt EMM übertragen SK . SK wird mit den verschiedenen GKi verschlüsselt in EMM GK1 GK2 übertragen . GKi wird mit den verschiedenen SKj verschlüsselt in EMM übertragen PK1 PK2 PK3 PK4 Pay-TV Jörg Schwenk 26 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement/CA Deaktivierung einer Chipkarte durch „positive Adressierung“ CW . Zum Deaktivieren von ECM Karte 4 müssen GK2 und SK ausgetauscht SK EMM werden. EMM1 enthält neuen GK2 verschlüsselt mit GK1 GK2 PK3. EMM2 enthält neuen SK verschlüsselt mit GK1 . EMM enthält neuen SK 3 PK verschlüsselt mit GK2 PK1 PK2 PK3 4 Pay-TV Jörg Schwenk 27 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement/CA Optimierung der „positiven CW Adressierung“ ECM . n Kunden, m-ärer Baum der Tiefe t SK EMM . n mt-1 . m(t-1)-1 = m log m n - 1 . Funktion (n fest) GK1 GK2 x logxn = (x/ln x) ln n hat Minimum bei x=e . Daher m = 2 oder m = 3 optimal. PK1 PK2 PK3 PK4 Pay-TV Jörg Schwenk 28 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement/CA „Positive Adressierung“ in der Praxis . ECM enthält . ID-Nummer des Kanals, für den sie bestimmt ist . Rechte, die für diesen Kanal benötigt werden (in der Reihenfolge Pay-per-Channel, Prebooked PPV, Impulsive PPV) . Gesichert mit MACSK(ID, Rechte) . EMM-U enthält . Nummer der Gruppe, der die Karte zugeordnet wird . Schlüssel der Gruppe, der die Karte zugeordnet wird . Verschlüsselt mit PKi . Gesichert mit MACPKi(Daten) Pay-TV Jörg Schwenk 29 Lehrstuhl für Netz- und Datensicherheit Schlüsselmanagement/CA „Positive Adressierung“ in der Praxis . EMM-G enthält . Adresse der Gruppe, für die die EMM bestimmt ist . Bitmap der Gruppe . Berechtigung, die die
Recommended publications
  • FCC-06-11A1.Pdf
    Federal Communications Commission FCC 06-11 Before the FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of ) ) Annual Assessment of the Status of Competition ) MB Docket No. 05-255 in the Market for the Delivery of Video ) Programming ) TWELFTH ANNUAL REPORT Adopted: February 10, 2006 Released: March 3, 2006 Comment Date: April 3, 2006 Reply Comment Date: April 18, 2006 By the Commission: Chairman Martin, Commissioners Copps, Adelstein, and Tate issuing separate statements. TABLE OF CONTENTS Heading Paragraph # I. INTRODUCTION.................................................................................................................................. 1 A. Scope of this Report......................................................................................................................... 2 B. Summary.......................................................................................................................................... 4 1. The Current State of Competition: 2005 ................................................................................... 4 2. General Findings ....................................................................................................................... 6 3. Specific Findings....................................................................................................................... 8 II. COMPETITORS IN THE MARKET FOR THE DELIVERY OF VIDEO PROGRAMMING ......... 27 A. Cable Television Service ..............................................................................................................
    [Show full text]
  • Tuesday 13 November 2007
    Tuesday 13 November 2007 RE: Response to the proposed BSkyB digital terrestrial television services consultation I wish to start by personally thanking you for allowing me to respond to the plans that British Sky Broadcastings plans to launch their Picnic platform on Digital Terrestrial Television, including the launch of the following services: z Sky Sports One; z A children's channel/Sky Movies SD One; z A factual channel/Sky News/Sky One; z Sky News (if BSkyB is given permission to launch a fourth service on DTT using MPEG-4 encoding); z Broadband up to 16Mbps and a telephony service. I wish to begin by giving an idea of my thoughts on the proposal by BSkyB before I answer the questions in the consultation document. Introduction 1. Regarding the use of by BSkyB and NDS Group, the VideoGuard conditional access technology for its pay television services. According to the press release that was released by BSkyB on the 8th of February 2007,1 the service will use a highly secure conditional access system similar to the one BSkyB uses for its digital satellite services, Sky Digital and FreesatFromSky. I also understand that Sky has also stated that viewers will require a new set-top-box to access the new service. In the past, since the launch of the Sky satellite television service in February 1989 via the Astra satellite, BSkyB have always used NDS Group technology to encrypt and protect their own branded services, with both the VideoCrypt and VideoGuard conditional access systems for their Sky analogue and digital satellite services respectively.
    [Show full text]
  • 3.3 Traitor Tracing Algorithm
    Traitor Tracing through Function Sharing by CemrQelebiler Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Master of Engineering and Bachelor of Science in Computer Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 1996 @ Cem Qelebiler, MCMXCVI. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part, and to grant others the right to do so. ;/// Author .. ................... 7..F. ................................ Departmenrd of Elvctr 1l Engineering and Computer Science ' 'December 15, 1995 C ertified by ....... : .. ........................................ Silvio Micali 'I t Profiorpof Computer Science ,.Thesis Supervisor Accepted by .. \... .. .......................... F.R. Morgenthaler sc•-srrs., ucE64sm •,Department ommittee ofr Graduate Theses OF TECHNOLOGY JUN111996 cng. UBRARIES Traitor Tracing through Function Sharing by Cem Q~elebiler Submitted to the Department of Electrical Engineering and Computer Science on December 15, 1995, in partial fulfillment of the requirements for the degrees of Master of Engineering and Bachelor of Science in Computer Science and Engineering Abstract To broadcast information (for example pay-television) over insecure channels (for ex- ample the public airwaves) to a set of paying subscribers, the broadcaster may employ encryption to prevent non-subscribers from gaining access to the programming. A risk to the broadcaster is that subscribers may sell or give their decryption key to non-subscribers and thus deprive the broadcaster of potential revenue. Traitor trac- ing schemes are key management schemes that allow the broadcaster to trace any subscriber who sells his key.
    [Show full text]
  • Study on the Use of Conditional Access Systems for Reasons Other Than The
    Study on the use of conditional access systems for reasons other than the protection of remuneration, to examine the legal and the economic implications within the Internal Market and the need of introducing specific legal protection Report presented to the European Commission by N. Helberger N. A. N. M. van Eijk P. B. Hugenholtz Institute for Information Law (IViR) University of Amsterdam Preface The study, commissioned by the Directorate-General for Internal Market and Financial Services (DG XV) of the Commission of the European Community, offers an analysis of the use of conditional access systems for other reasons than the protection of remuneration interests. The report also examines the need to provide for additional legal protection by means of a Community initiative, such as a possible extension of the Conditional Access Directive. The report will give a legal and economic analysis of the most important non- remuneration reasons to use conditional access (CA), examine whether services based on conditional access for these reasons are endangered by piracy activities, to what extent existing legislation in the Member States provides for sufficient protection, and what the possible impact of the use of conditional access is on the Internal Market. Furthermore, the study analysis the specific legislation outside the European Union, notably in Australia, Canada, Japan and the US, as well as the relevant international rules at the level of the EC, WIPO and the Council of Europe. This study was written by Natali Helberger and Dr Nico A. N. M. van Eijk at the Institute for Information Law (IViR), University of Amsterdam under the supervision of Professor P.
    [Show full text]
  • 912Digital Sat Equipment 912-Tt
    DIGITAL SAT EQUIPMENT 912-TT 912 DVB-S/S2 to DVB-T/H with Common Interface transmodulators Description Transmodulator of encrypted satellite digital television services to terrestrial digital television. Each module selects the services of a DVB-S/S2 satellite transponder and includes them in a DVB-T channel. Equipped with a Common Interface slot for insertion of the CAM and the subscriber’s card. Programmable using PC software and a wireless programmer. Applications Collective terrestrial digital television installations where the aim is to distribute encrypted satellite television services while avoiding the installation of satellite receivers. Compatible with all collective TV installations since the channels can be distributed throughout the terrestrial band. TT-211 Characteristics Automatic error-detection system which greatly reduces maintenance work on the installation. Generated output channel of outstanding quality. Does not include the CAM or the decoder card. Zamak chassis with metal side panels. F-type connectors. The equipment can be assembled quickly and easily. CODE 9120147 MODEL TT-211 DVB-S / DVB-S2 DVB-T/DVB-H TV system EN 300421 EN 302307 EN 300744 DVB-S/S2 receiver Frequency range MHz 950 - 2.150 Frequency step KHz 1 +12 LNB power supply mA 350 máx Symbol rate Mbaud 1..45 Diplexing through loss dB±TOL 1.0 ±0,2 DVB-S2 receiver dBμV 45..95 Input level dBm -63..-13 F.E.C. QPSK Auto, 1/2, 3/5, 2/3, 3/4, 4/5 5/6, 8/9, 9/10 DVB: EN 302307 F.E.C. 8PSK Auto, 3/5, 2/3, 3/4, 5/6, 8/9, 9/10 DVB: EN 302307 Roll-Off dB 0,35/0,25/0,20 DVB-S receiver dBμV 40..95 Input level dBm -68..-13 F.E.C.
    [Show full text]
  • Institutionen För Systemteknik Department of Electrical Engineering
    Institutionen för systemteknik Department of Electrical Engineering Examensarbete Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Examensarbete utfört i Datorteknik vid Tekniska högskolan vid Linköpings universitet av Gustaf Bengtz LiTH-ISY-EX--14/4791--SE Linköping 2014 Department of Electrical Engineering Linköpings tekniska högskola Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Examensarbete utfört i Datorteknik vid Tekniska högskolan vid Linköpings universitet av Gustaf Bengtz LiTH-ISY-EX--14/4791--SE Handledare: Oscar Gustafsson isy, Linköpings universitet Patrik Lantto WISI Norden Examinator: Kent Palmkvist isy, Linköpings universitet Linköping, 12 augusti 2014 Avdelning, Institution Datum Division, Department Date Organisatorisk avdelning Department of Electrical Engineering 2014-08-12 SE-581 83 Linköping Språk Rapporttyp ISBN Language Report category — Svenska/Swedish Licentiatavhandling ISRN Engelska/English Examensarbete LiTH-ISY-EX--14/4791--SE C-uppsats Serietitel och serienummer ISSN D-uppsats Title of series, numbering — Övrig rapport URL för elektronisk version Titel Analys av nya alternativa krypteringsalgoritmer och skramblingsmetoder för digital-TV Title samt implementation av en ny skramblingsalgoritm (AES128) på FPGA Analysis of new and alternative encryption algorithms and scrambling methods for digital-tv and implementation of a new scrambling algorithm (AES128) on FPGA Författare Gustaf Bengtz Author Sammanfattning Abstract This report adresses why the currently used scrambling standard CSA needs a replacement. Proposed replacements to CSA are analyzed to some extent, and an alternative replacement (AES128) is analyzed.
    [Show full text]
  • Institutionen För Systemteknik 581 83 LINKÖPING
    Avdelning, Institution Datum Division, Department Date 2004-06-04 Institutionen för systemteknik 581 83 LINKÖPING Språk ISBN Language Rapporttyp Report category Svenska/Swedish Licentiatavhandling ISRN LITH-ISY-EX-3533-2004 X Engelska/English X Examensarbete C-uppsats Serietitel och serienummer D-uppsats Title of series, numbering ISSN Övrig rapport ____ URL för elektronisk version http://www.ep.liu.se/exjobb/isy/2004/3533/ Titel Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare Title Plastic card frauds, a survey of current relevant card and system properties Författare Natalia Savostyanova and Valeriya Velichko Author Sammanfattning Abstract Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided by paper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing.
    [Show full text]
  • RECE\VED Tio~ , 0 \992
    DECTEC INTERNATIONAL INC. P.D. BOX 2275, 1 962 MILLS ROAD, SIDNEY, BRITISH COLUMBIA, CANADA VBL 3SB PHONE: (604) 655-4463 . ._.... FAX: (604) 655-3906 RECE\VED tiO~ , 0 \992 • COMMISSION ftDEkAL coMMUNICATIONS y OFF:"Ir.E OF THE SECRETAR October 8, 1991 RECEIVED OCT 15 IY9, Ms Donna Searcy Secretary, Federal Communications Commission FCC M/' 1919 M Street ,.,IL BRANCH Washington, DC 20515 Dear Ms. Searcy, This letter is presented in support of a filing submitted to the Commission by the Consumer Satellite Coalition on July 1, 1991. The document filed by the CSC requested a public hearing/inquiry on the monopolistic business practices of General Instrument Corporation and the distribution and sale to consumers by the General Instrument division of Forstmann Little Corporation of a defective descrambling product which is used by consumers and cable operators to unscramble programming delivered over satellite. As a research and development firm which has spent the past three years developing a universal scrambling system designed to run multiple encryption and decryption processes through one single decoder, we submit that General Instrument has deceived the pUblic, the governments of the united States and Canada, television programmers, hollywood producers, satellite and consumer electronic retailers, and the manufacturers of Integrated Receiver Descramblers in the sales and upgrade programs associated with its videocipher II scrambling system, (exhibit A). Through our work as a well-respected research and development company who has been
    [Show full text]
  • Brute-Force Angriff Auf DVB-CSA1 Mithilfe Eines Preisgünstigen FPGA-Clusters
    Brute-force Angriff auf DVB-CSA1 mithilfe eines preisgünstigen FPGA-Clusters BACHELORARBEIT zur Erlangung des akademischen Grades Bachelor of Science im Rahmen des Studiums Technische Informatik eingereicht von Ioannis Daktylidis Matrikelnummer 1128193 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Mitwirkung: DI Dr. Markus Kammerstetter Wien, 15. April 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Brute-force Attacks on DVB-CSA1 using a low-cost FPGA-Cluster BACHELOR’S THESIS submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Engineering by Ioannis Daktylidis Registration Number 1128193 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.-Prof. DI Dr. Wolfgang KASTNER Assistance: DI Dr. Markus Kammerstetter Vienna, 15th April, 2017 Ioannis Daktylidis Wolfgang KASTNER Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Ioannis Daktylidis [email protected] Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwendeten Quellen und Hilfs- mittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 15. April 2017 Ioannis Daktylidis iii Abstract The DVB Common Scrambling Algorithm (CSA) is widely used to encrypt PayTV MPEG transport streams around the world.
    [Show full text]
  • Tr 101 532 V1.1.1 (2015-02)
    ETSI TR 101 532 V1.1.1 (2015-02) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.1 (2015-02) Reference DTR/E2NA-00004-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Copyright and DRM
    CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought over pornography, neo-Nazism, bomb design, blasphemy, or political dissent. Instead, the Armageddon of digital control, the real death match between the Party of the Past and Party of the Future, will be fought over copyright. — John Perry Barlow Be very glad that your PC is insecure — it means that after you buy it, you can break into it and install whatever software you want. What YOU want, not what Sony or Warner or AOL wants. — John Gilmore 22.1 Introduction Copyright, and digital rights management (DRM), have been among the most contentious issues of the digital age. At the political level, there is the conflict alluded to by Barlow in the above quotation. The control of information has been near the centre of government concerns since before William Tyndale (one of the founders of the Cambridge University Press) was burned at the stake for printing the Bible in English. The sensitivity continued through the estab- lishment of modern copyright law starting with the Statute of Anne in 1709, through the eighteenth century battles over press censorship, to the Enlight- enment and the framing of the U.S. Constitution. The link between copyright and censorship is obscured by technology from time to time, but has a habit of reappearing. Copyright mechanisms exist to keep information out of the hands of people who haven’t paid for it, while censors keep information out of the hands of people who satisfy some other criterion.
    [Show full text]
  • Conditional Access and Digital Television
    Conditional access and digital television Research Paper 96/49 12 April 1996 The phrase "conditional access" is used to describe the systems by which subscription television companies, such as BSkyB, control viewers' access to different programmes and channels so that only those who have paid the appropriate charges can actually watch the services. This paper examines the Government's proposals for regulating conditional access services in light of EC directive 95/47/EC on television standards. This paper accompanies Research Paper 96/48 on the Broadcasting Bill [H.L.] [Bill 88 1995/96]. William Lea Science and Environment Section House of Commons Library Library Research Papers are compiled for the benefit of Members of Parliament and their personal staff. Authors are available to discuss the contents of these papers with Members and their staff but cannot advise members of the general public. CONTENTS Page I Introduction 5 A. Overview 5 B. What is conditional access? 6 C. Conditional access and subscriber management systems in the UK 7 D. Why is conditional access important? 10 E. Possible solutions 11 II EC directive 95/47/EC on television standards 13 A. History of proposals 13 B. Main provisions of directive 95/47/EC 15 C. European DVB group and the common interface 19 III Government policy document on digital terrestrial broadcasting 21 A. Introduction 21 B. BBC's response 22 C. ITV's response 22 D. BSkyB's response 24 E. ITC's response 25 F. Oftel's response 25 G. DNH's summary of responses 26 IV DTI consultation paper on the regulation of conditional access 27 A.
    [Show full text]