Abstract
In 2004, SCTE has approved the POD (point-of-deployment) copy protection system as an ANSI standard. In the POD copy protection system, before the POD module removes the scrambling, this module first authenticates a host device to confirm its legitimization. The confirmation procedure is known as a “host authentication mechanism”. However, in 2005, Tian et al. showed that the host authentication mechanism in the current POD copy protection system has the following three weaknesses: (1) The re-authentication procedure cannot stand out a simple replay attack. (2) The host authentication protocol can make a DH (Diffie-Hellman) private key in any run as significant as a device private key. (3) The credentials of the POD module are futile. This paper proposes an improved secure host authentication mechanism for the current POD copy protection system that not only withstands the above three weaknesses but also provides same efficiency.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
ANSI/SCTE, POD Copy Protection System. Society of Cable Telecommunications Engineers, 2004, ANSI/SCTE 41 (2004)
ANSI/SCTE, POD Copy Protection System. Society of Cable Telecommunications Engineers, 2001, ANSI/SCTE 41 (2001)
Zhang, C.N., Li, H., Zhang, N.N., Xie, J.S.: A DSP Based POD Implementation for High Speed Multimedia Communications. EURASIP Journal on Applied Signal Processing 2002(9), 975–980 (2002)
Kim, W.H., Song, W.J., Kim, B.G., Ahn, B.H.: Design and Development of a new POD security module chip-set based on the OpenCable specification. IEEE Trans. on Consumer Electron. 48(3), 770–775 (2002)
Traw, C.B.S.: Protecting Digital Content within the home. Compter 34(10), 42–47 (2001)
Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Elsevier Signal Processing: Image Communication 16, 681–699 (2001)
Tian, H.-B., Zhan, Y., Wang, Y.-M.: Analysis of Host Authentication Mechanism in Current POD Copy Protection System. IEEE Transactions on Consumer Electronics 51(3) (August 2005)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptograph. CRC Press, New York (1997)
ISO/IEC, Information Technology-Security Techniques - Entity Authentication Mechanisms - Part 2: Entity authentication using symmetric techniques, International Organization for Standardization and International Electro-technical Commission, ISO/IEC JTC 1/SC 27 N739 DIS 9798-2, 1993-08-13 (1993)
Mao, W.B.: Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yoon, EJ., Yoo, KY. (2008). Improving the Host Authentication Mechanism for POD Copy Protection System. In: Tsihrintzis, G.A., Virvou, M., Howlett, R.J., Jain, L.C. (eds) New Directions in Intelligent Interactive Multimedia. Studies in Computational Intelligence, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68127-4_39
Download citation
DOI: https://doi.org/10.1007/978-3-540-68127-4_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68126-7
Online ISBN: 978-3-540-68127-4
eBook Packages: EngineeringEngineering (R0)