Conditional Access Concepts and Principles

  • David W. Kravitz
  • David M. Goldschlag
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1648)


This paper describes concepts and principles for infrastructures that manage chargeable content, more commonly known as conditional access (CA) systems. We present a functional overview of CA systems and the security components and design principles that enable the solutions. We then present concepts that may be used to quantify the risk associated with the delivery of particular valued content in a particular way. Finally, we describe how the threat model changes as the networking bandwidth available to pirates and their customers increases, and propose a possible long-term solution.


Auditability authentication conditional access copyright protection smart cards trust management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    R. Anderson and M. Kuhn, “Low Cost Attacks on Tamper Resistant Devices,” 5th Security Protocols Workshop, Lecture Notes in Computer Sciences 1361, Springer-Verlag, 1997, pages 125–136.CrossRefGoogle Scholar
  2. 2.
    International Business Machine. 1997. Cryptolope containers: A white paper.Google Scholar
  3. 3.
    J.L. Cohen, M.H. Etzel, D.W. Faucher, and D.N. Heer, “Security for Broadband Digital Networks,” Communications Technology, August 1995, pages 58–69.Google Scholar
  4. 4.
    ‘Open Verifier’ Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.Google Scholar
  5. 5.
    ISO 7816 Identification Cards, Integrated Circuit Cards with Contact, 1987.Google Scholar
  6. 6.
    EIA-679, National Renewable Security Standard (NRSS) Parts A and B, March 1998.Google Scholar
  7. 7.
    D.M. Goldschlag and D.W. Kravitz, “Pirate Card Rejection,” Cardis 98,Louvain-la-Nueve, Belgium, September 14-16, 1998.Google Scholar
  8. 8.
    J.P.M.G. Linnartz, “The ‘Ticket’ Concept for Copy Control Based on Embedded Signalling,” ESORICS 98, Louvain-la-Nueve, Belgium, September 16-18, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • David W. Kravitz
    • 1
  • David M. Goldschlag
    • 1
  1. 1.DivxHerndonUSA

Personalised recommendations