Attacks on Pay-TV Access Control Systems. Markus G. Kuhn Computer Laboratory
|
|
|
- Franklin Floyd
- 9 years ago
- Views:
Transcription
1 Attacks on Pay-TV Access Control Systems Markus G. Kuhn Computer Laboratory
2 Generations of Pay-TV Access Control Systems Analog Systems remove sync information, try to confuse gain-control in receiver, etc. cryptography is not essential part of decoding process still dominant type for most cable-tv premium channels Hybrid Systems broadcasted signal conforms to analog TV standard (PAL, D2MAC, NTSC, SECAM) analog signal scrambled with digital framebuffer using a cryptographically transmitted control word fully cryptographic subscription management using smartcards examples: VideoCrypt, EuroCrypt (EN 50094), Syster Nagravision Digital Systems broadcasted signal is digitally modulated, encrypted, and multiplexed MPEG-2 audio and video data stream cryptographic subscription management using smartcards as with hybrid systems examples: DVB, DSS/VideoGuard
3 Example of a Hybrid System: VideoCrypt CPU1 CPU2 ADC SATreceiver FIFO-1 FIFO-2 Scrambler Smartcard DAC TV OSD EPA A2 Features: scrambling by active-line rotation, requires only memory for one single image line vertical-blank-interval data contains 32-byte messages with blacklist/whitelist data smartcard calculates 60-bit MAC as control word from 32-byte messages every 2.5 s CPU1 salts control word with frame counter to generate 60-bit PRNG seed per frame Scrambler uses 60-bit seed to generate cut-point sequence per frame
4 An Image Processing Attack on VideoCrypt unscrambled source signal broadcasted scrambled signal result of cross-correlation with edge detector avoids horizontal final b/w descrambling result obtained cutpoints marked penalty zones around cut points without knowledge of card secret
5 The VideoCrypt Smartcard Protocol Flow control ISO 7816 T=0 protocol: sent by decoder /smartcard CLA INS P1 P2 P3 INS DATA[1]... DATA[P3] SW1 SW2 Instructions INS length (P3) sent by purpose 70h 6 card card serial number 72h 16 decoder message from previous card 74h 32 decoder message from broadcaster 76h 1 decoder authorize button pressed 78h 8 card control word (MAC of 74h) 7ah 25 card onscreen display message 7ch 16 card message to next card 7eh 64 card Fiat-Shamir squared random number 80h 1 decoder Fiat-Shamir challenge bit 82h 64 card Fiat-Shamir response
6 VideoCrypt or How not to use the Fiat-Shamir ZKT Protocol Decoder INS 70h: card number V (48 bits) Smartcard INS 7eh: X = R² mod N (512 bits) (knows secret S with S² = V mod N, INS 80h: Q (1 bit) where N = p q) INS 82h: Y = R Y = R S mod N if Q = 0 if Q = 1 Decoder receives Q periodically from broadcaster and forwards it to the smartcard Decoder is supposed to reject smartcard if the following test fails (first generation did not): Y² = X mod N if Q = 0 Y² = X V mod N if Q = 1 Attack Decoder has no memory to verify that X is different each time, so pirate card just observes V, R, R² mod N, and R S mod N from any card and replays those values each time.
7 Replay attacks against VideoCrypt Vulnerabilities 1) all VideoCrypt smartcards working on the same channel reply identically 2) the scrambled VideoCrypt signal can be replayed with a normal home VCR Real-time card sharing (old proposal, not implemented) One owner of a genuine card provides the control words in real-time via wire or radio to owners of decoders without a card (60 bits every 2.5 s). Offline Internet card sharing (common practice!) One owner of a genuine card records control words and synchronization information for a specific show (say Star Trek on Sunday, 18:00) in a VideoCrypt Logfile (VCL) and publishes this on her Web page. Decoder owners without card record the scrambled programme, then download VCL file and put decoder between VCR and TV. A PC then emulates card and replays control words from VCL file. VideoCrypt Broadcast Logfiles (VBL) allow a posteriori VCL file generation. Potential risk Covert channel might identify card owner in public VCL files, therefore use VCL voter
8 Secret Hash/MAC Algorithms in VideoCrypt Smartcards Hash and Signature Check Structure: j = 0; answ[0..7] := 0; for i:=0 to 26 do round(msg[i]); b := 0; for i:=27 to 30 do round(b); round(b); if answ[j]!= msg[i] then signature wrong j := (j + 1) mod 8; only in P07 b := msg[i]; in P09 handle nanocommands here for i:=1 to 64 do round(msg[31]); Input: msg[0..31] Output: answ[0..7] all variables are 8-bit unsigned Round Function in BSkyB P07: parameter p answ[j] := answ[j] xor p; c := sbox[answ[j] / 16] + sbox[answ[j] mod ]; c := rotate_right(rotate_left(not c, 1) + p, 3); j := (j + 1) mod 8; answ[j] := answ[j] xor c; P09 card used completely different round function
9 BSkyB P09 Structure of 32-byte Message in Instruction 74h e8 43 0a c 29 e4 03 f fb 54 ac months since 1989 channel subcommand code xor x[0] address prefix xor x[0..3] address suffixes or ECM nanocommands signature checksum random byte XOR Scrambling: Subcommands: Nanocommands: a := msg[1] xor msg[2]; 00 deactivate card cause calculated jumps into swap_nibbles(a); 01 deactivate Sky Movies highly obscure machine code, b := msg[2];... many add additional rounds, for i:=0 to 3 do 20 activate card some read or write RAM or b := rotate_left(b, 1); 21 activate Sky Movies EEPROM locations, the b := b + a;... nanocommand interpreter x[i] := b; 40 PPV management is designed to be extremely 80 ECM nanocommands non-portable and difficult to... understand
10 Conductive Silver Ink Attack on the BSkyB P10 Card view from non-pad side VCC RST CLK VCC RST CLK BICMOS18 M6007E001 VCC RST ASIC µc GND to µc I/O CLK GND ROM to ASIC 5754 ISD F2 D2 M3 Drill two holes from pad side with 1 mm drill and fill holes with conductive silver ink to establish contact with free pads free pad GND GND pad I/O VPP pad (free) Cut line from pad side with sharp knife M. Kuhn
11 Some Pay-TV Pirate Devices "Battery-powered smartcard", Megasat Bochum Conductive silver ink attack on BSkyB P10 card (top), with card CPU replaced by external DS5002FP (right) BSkyB P9 deactivation blocker ISO 7816 to RS-232 adapter (Season7)
12 Access Control for Digital Video Broadcasting (DVB) receiver demodulator error correction common interface conditional access module MPEG stream demultiplexer MPEG audio decoder MPEG video decoder data interface TV PC Access control issues: Standardization of complete access control system was politically not possible Standardization of Common Interface (PCMCIA slot) to allow plug-in access control Standardization of Common Scrambling Algorithm will at least allow SimulCrypt, where different access control systems can decrypt the same control words in order to descramble the same programme
13 Idea Robust Key Management Scheme for Pay-TV Smart Cards Every card contains a subset of L=10 keys out of a pool of K L=300 keys K i,j which are used for session key uploads CL If pirates open C=20 cards, only (1-(1-1/K) ) = 0.08% of the genuine cards have to be replaced to recover confidentiality of session key updates Example L=6, K=5, C=2 K 1,1 K K K K 1,2 1,3 1,4 1,5 K 2,1 K K K K 2,2 2,3 2,4 2,5 K 3,1 K K K K 3,2 3,3 3,4 3,5 K 4,1 K K K K 4,2 4,3 4,4 4,5 K 5,1 K K K K 5,2 5,3 5,4 5,5 K 6,1 K K K K 6,2 6,3 6,4 6,5 Compromised Key Key in an uncompromised card Single rows or all uncompromised keys are used for session key uploads Each card knows one key per row Cards that know only compromised keys have to be replaced
14 Lessons Learned from Pay-TV Piracy Every security microcontroller and ASIC will be reverse engineered within weeks if pirates see a chance to make a million dollars profit from doing it Routine recovery from attacks by ECMs, key updates, exchange of security modules, etc. must already be planned for in the design phase of a large scale cryptographic application Today s EEPROM processor smart card technology is unsuitable for holding global secrets Continuous pirate market observation and analysis of pirate devices becomes routine activity for any consumer multimedia access control system operator Obfuscated programming, customized processors, and other portability surprises in security module software are successful for only a few days and should be replaced by more flexible key management (Kerckhoffs principle) Analog and hybrid pay-tv systems do not provide signal confidentiality and will eventually be broken by real-time image processing attacks
Broadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
Digital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
Monitoring Conditional Access Systems
Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1
EV-8000S Features & Technical Specifications EV-8000S Major Features & Specifications 1 I. General Description EV-8000S is fully compliant with the international DVB standard and thus transmits digital
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
How Pay-TV becomes E-Commerce
How Pay-TV becomes E-Commerce This is an extended version of a conference paper presented at 7th International IEEE Conference on E-Commerce Technology 2005 (Munich, July 19-22) IEEE Press P2277, ISBN
MPEG-2 Transport vs. Program Stream
MPEG-2 Transport vs. Program Stream White Paper What is the difference between Program Stream and Transport Stream, and why do we currently only support the Transport Stream format? Well, this topic is
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
- Open Architecture/Interoperability Issues
Digital Set Top Box (STB) - Open Architecture/Interoperability Issues The DVB (Digital Video Broadcast) project group has developed a family of interrelated international standards for digital television
Sample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
DVCrypt Conditional Access System
DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Pro:Idiom System Description
Pro:Idiom System Description Introduction and Summary The Zenith Electronics copy protection system (Pro:Idiom) provides end-to-end cryptographic security for protecting digital HD and SD video (including
DIRECT TO HOME TELEVISION (DTH)
DIRECT TO HOME TELEVISION (DTH) Today, most satellite TV customers in developed television markets get their programming through a direct broadcast satellite (DBS) provider, such as DISH TV or DTH platform.
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
SMiT Professional CAM User Guide
1. Introduction SMiT Professional CAM User Guide SMiT Professional CAM User Guide -- Conax SMiT Conax Chipset Pairing CAM, with an authorized Conax smart card, gives access to DVB encrypted programs. It
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
From Digital Television to Internet? A general technical overview of the- DVB- Multimedia Home Platform Specifications
From Digital Television to Internet? A general technical overview of the- DVB- Multimedia Home Platform Specifications Vita Hinze-Hoare Abstract This paper provides a general technical overview of the
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Dazzle. Digital Video Creator 100 User s Guide
Dazzle Digital Video Creator 100 User s Guide Copyright SCM Microsystems. All rights reserved. Trademarks are used for informational purposes, and remain the property of their owners. Part number 401737
Atmel Norway 2005. XMEGA Introduction
Atmel Norway 005 XMEGA Introduction XMEGA XMEGA targets Leadership on Peripheral Performance Leadership in Low Power Consumption Extending AVR market reach XMEGA AVR family 44-100 pin packages 16K 51K
R&S AVG050 DVB Satellite Receiver Compact DVB-S and DVB-S2 satellite demodulator
AVG050-SAT_bro_en_3606-8508-12_v0200.indd 1 Product Brochure 02.00 Broadcast & Media R&S AVG050 DVB Satellite Receiver Compact DVB-S and DVB-S2 satellite 08.09.2015 13:23:25 R&S AVG050 DVB Satellite Receiver
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne
RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
MICROPROCESSOR. Exclusive for IACE Students www.iace.co.in iacehyd.blogspot.in Ph: 9700077455/422 Page 1
MICROPROCESSOR A microprocessor incorporates the functions of a computer s central processing unit (CPU) on a single Integrated (IC), or at most a few integrated circuit. It is a multipurpose, programmable
Product Information S N O. Portable VIP protection CCTV & Alarm System 2
Product Information S N O Portable VIP protection CCTV & Alarm System 2 G O V E R N M E N T A L S E C U R I T Y S O L U T I VIP KIT Rapid Deployment VIP Protection Kit The VIP KIT has been designed to
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
SHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
Single channel data transceiver module WIZ2-434
Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules
Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the
DVI Interface The outline: The reasons for digital interface of a monitor the transfer from VGA to DVI. DVI v. analog interface. The principles of LCD control through DVI interface. The link between DVI
Appendix A. CMS(Client Management Software)
Appendix A. CMS(Client Management Software) A-1. Install CMS for Windows PC CMS is a program for communication between DVR and PC to control signal and video. Insert the enclosed CD, and go to CD-ROM Drive
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT
An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for
8051 MICROCONTROLLER COURSE
8051 MICROCONTROLLER COURSE Objective: 1. Familiarization with different types of Microcontroller 2. To know 8051 microcontroller in detail 3. Programming and Interfacing 8051 microcontroller Prerequisites:
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Higth definition from A to Z. www.azbox-hd.com
Higth definition from A to Z www.azbox-hd.com Do you Feel the full HD multimedia? Wifi Web Browser Yes, you read this correctly. O2media present a new line of AzBox HD receivers, with the AzBox HD Elite
PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0
PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera
Lesson 10:DESIGN PROCESS EXAMPLES Automatic Chocolate vending machine, smart card and digital camera 1 Automatic Chocolate Vending Machine (ACVM) 2 Diagrammatic representation of ACVM Keypad for user Interface
Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation
Quick Installation A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding This chapter intends to get your new FuzzyScan scanner working with your existing system within minutes. General instructions
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
MANUAL FOR RX700 LR and NR
MANUAL FOR RX700 LR and NR 2013, November 11 Revision/ updates Date, updates, and person Revision 1.2 03-12-2013, By Patrick M Affected pages, ETC ALL Content Revision/ updates... 1 Preface... 2 Technical
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Method for Electronic Content. Distribution and Right Management. Abstract
Method for Electronic Content Distribution and Right Management Abstract The present paper proposes a method for managing the copyright of electronic content, especially huge size documents. The user,
Cable TV Headend Solutions
Product Family DVX Platform Cable TV Headend Solutions The DVX platform TELESTE DVX is a complete solution for digital and analogue broadcasting infrastructures for cable operators. The offering includes
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Projector Control Command Reference Manual
Projector Control Reference Manual Copyright (C) NEC Display Solutions, Ltd. 2014-2015 BDT140013 Revision 4.0 Introduction This manual describes the commands used to control an NEC-made projector from
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Alarms of Stream MultiScreen monitoring system
STREAM LABS Alarms of Stream MultiScreen monitoring system Version 1.0, June 2013. Version history Version Author Comments 1.0 Krupkin V. Initial version of document. Alarms for MPEG2 TS, RTMP, HLS, MMS,
MyM 3T. User Manual. English
User Manual Compact unit with 2 DVB-T tuners MPEG-2 and MPEG-4 compliant 3 analogue modulators Two CI for decryption or multidecryption NICAM or A2 stereo 12-volt power supply Low power consumption MyM
This high-performance TV signal analyzer provides analog/digital TV and satellite TV monitoring and provides various video decoding.
This high-performance TV signal analyzer provides analog/digital TV and satellite TV monitoring and provides various video decoding. Overview This high-performance TV signal analyzer features DVB-C/S/S2
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
HP4000EX Hardware Manual
INFORMATION TO USER CAUTION RISK OF ELECTRIC SHOCK, DO NOT OPEN! CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK). NO USER SERVICEABLE PARTS INSIDE. REFER SERVICING TO QUALIFIED
reach a younger audience and to attract the next-generation PEG broadcasters.
PEG Streaming Public, Education, and Government (PEG) TV channels have been going through an evolution. Once the exclusive domain of "cable TV", PEG's have evolved to become Community Media Centers, serving
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
9600 IP. Set Top Box. User s Guide
9600 IP Set Top Box User s Guide For your safety Information contained in this manual is subject to change without notice. No part of this publication may be copied, reproduced, or translated to another
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Technical Specification Digital Video Broadcasting (DVB); Content Scrambling Algorithms for DVB-IPTV Services using MPEG2 Transport Streams
TS 103 127 V1.1.1 (2013-05) Technical Specification Digital Video Broadcasting (DVB); Content Scrambling Algorithms for DVB-IPTV Services using MPEG2 Transport Streams 2 TS 103 127 V1.1.1 (2013-05) Reference
Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems. 2008 Chapter-1L03: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems 1 Typical Embedded System Hardware units 2 Basic Circuit Elements at the System 3 (i) Power Source 1. System own supply with separate supply
8-Bit Flash Microcontroller for Smart Cards. AT89SCXXXXA Summary. Features. Description. Complete datasheet available under NDA
Features Compatible with MCS-51 products On-chip Flash Program Memory Endurance: 1,000 Write/Erase Cycles On-chip EEPROM Data Memory Endurance: 100,000 Write/Erase Cycles 512 x 8-bit RAM ISO 7816 I/O Port
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
PAL to NTSC (NTSC to PAL) Converter with 19 inch Rack (CDM-640AR)
PAL to NTSC (NTSC to PAL) Converter with 19 inch Rack (CDM-640AR) Operation Manual Introduction This unit will convert NTSC/PAL or VGA input signal into NTSC/PAL or VGA output. It offers premium conversion
Secure Cloud Storage and Computing Using Reconfigurable Hardware
Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications
Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
CHAPTER 11: Flip Flops
CHAPTER 11: Flip Flops In this chapter, you will be building the part of the circuit that controls the command sequencing. The required circuit must operate the counter and the memory chip. When the teach
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Application Note AN-00160
Considerations for Sending Data Over a Wireless Link Introduction Linx modules are designed to create a robust wireless link for the transfer of data. Since they are wireless devices, they are subject
CHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012
Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS 140-2 Cryptographic Module Security Policy Document Version: 1.0 Date: April 25, 2012 Athena Smartcard Inc. Public Material may be reproduced only
