Skip to main content
Log in

Huffman based conditional access system for key distribution in digital TV multicast

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The advance of modern network technologies has made Digital TV systems available throughout the world. To provide secure media delivery in Digital TV systems, a large number of messages are exchanged for key updates in the conventional key distributed schemes of conditional access systems (CAS). In this paper, proposed a new multicast key distribution scheme based on Huffman grouping scheme of access control for conditional access system (CAS) in digital television multicast. The proposed key distribution scheme can greatly reduce the computation using fast Fourier transform and acquire higher efficiency and security using extended Euclidean algorithm. With this scheme, only authorized subscribers can watch the subscriber programs correctly. Unauthorized subscribers have no information to retrieve the correct programs over the networks. Moreover, the proposed scheme is more flexible in processing subscribers joining and leaving which is achieved by using Huffman based grouping scheme and is very important for service provider to dynamic manage the subscriber.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akl SG, Taylor PD (1982) Cryptographic solution to a multilevel security problem. Proc. Crypto-82, Santa Barbara, CA, August 23–25, pp 237–250

  2. Antequera N, Loperz-Ramos JA (2011) Remarks and countermeasures on a cryptoanalysis of a secure multicast protocol. Proceedings of 7th International Conference on Next Generation Web Services Practices, Salamanca 2011, Salamanca (Spain) 201–205

  3. Chan KC, Chan SHG (2003) Key management approaches to offer data confidentiality for secure multicast. IEEE Netw 17(5):30–39

    Article  Google Scholar 

  4. Conditional Access Broadcasting Systems (1992) ITU-R Rec. 810

  5. EBU Project Group B/CA (1995) Functional model of a conditional access system. EBU Tech Rev, pp. 64–77, Winter

  6. Harn L, Lin HY (1990) A new cryptographic key generation scheme for multilevel data security. Comp Secur 539–546

  7. Jiang T et al. (February 2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50(1)

  8. Lee JW (1996) Key distribution and management for conditional access system on DBS. In: Proc. Int. Conf. Cryptology and Information Security, pp 82–86

  9. Macq BM, Quisquater JJ (June 1995) Cryptology for digital TV broadcasting. Proc IEEE 83:944–957

    Google Scholar 

  10. Naranjo JAM, Antequera N (LG) Casado and J.A. Lopez-Ramos. A suite of algorithms for key distribution and authentication in centralized secure multicast environments. To appear in J Comp Appl Math, doi:10.1016/j.cam.2011.02.015

  11. Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean Algorithm. Proceedings of CISIS 2011. Lect Notes Comput Sci 6694:177–182

    Article  Google Scholar 

  12. Ray I Narasimhamurthi N A cryptographic solution to implement access control in a hierarchy and more

  13. RCz S (1967) On computing the fast fourier transform. Commun AGM 10:647–654

    Google Scholar 

  14. Sakakibara H et al. (1994) The ID-based noninteractive group communication key sharing scheme using smart cards. In: Proc. Int. Conf. Network Protocols, pp. 91–98

  15. Scott M (1990) An implementation of the fast-fourier multiplication algorithm. Technical Rep ort CA-0790, Dublin City University

  16. St Denis T (2003) BigNum math implementing cryptographic multiple precision arithmetic. SYNGRESS Publishing

  17. Trappe W, Song J, Poovendran R, Liu KJR (2003) Key management and distribution for secure multimedia multicast. IEEE Trans Multimed 5(4):544–557

    Article  Google Scholar 

  18. Trappe W, Washington LC (2007) Introduction to cryptography with coding theory, second edn. Pearson Education, pp. 66–70

  19. Tu FK, Laih CS, Tound SH On key distribution management for condition access system on Pay-TV system. In: 1998 I.E. Int. Symp. Consumer Electronics (ISCE’98), vol. 45. Taipei, Taiwan, R.O.C., pp 151–159

  20. Varalakshmi R, RhymendUthariaraj V (2011) A New Secure Multicast Group Key Management Using Gray Code”, Paper No: 978-1-4577-0590-8/11, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011,MIT. Anna University, Chennai

    Google Scholar 

  21. Zhu S, Jajodia S (2010) Scalable group key management for secure multicast: a taxanomy and new directions. In: Huand H, MacCallum D, Du Dz (eds) Network security. Springer, United States, 57–75

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Varalakshmi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Varalakshmi, R., Uthariaraj, V.R. Huffman based conditional access system for key distribution in digital TV multicast. Multimed Tools Appl 74, 2899–2912 (2015). https://doi.org/10.1007/s11042-013-1753-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1753-9

Keywords

Navigation