Skip to main content

Protection in Broadcast

  • Chapter
  • First Online:
Securing Digital Video
  • 1036 Accesses

Abstract

Since the 80’s, conditional access systems protect broadcast content. We explore standardized systems such DVB, CI+ and OpenCard. The failed initiative of the broadcast flag illustrates some of the nontechnical traps of content protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In the US, the separation is more complex because there are also premium channels such as HBO and ShowTime.

  2. 2.

    After a few years, it was a common exercise in some French electronic engineering schools to study how to hack the Canal+ signal.

  3. 3.

    Line cut and rotate scrambling was never broken (at least practically). One implementation of line shuffling was broken due to a weak implementation of the random permutation. This permutation used a limited table of fixed permutations that was reverse engineered. Once the table was disclosed, it was easy to build a pirate decoder. In other words, the entropy of the permutation was too small.

  4. 4.

    XORed means applying the Boolean exclusive OR operator. The result of the XOR operation on two operands is true if exactly one operand is true.

  5. 5.

    In fact, DVB-CSA used a 56-bit key with only 40 bits of entropy. This was to comply with limiting regulations. Due to the short lifetime of the key, it is assumed to be long enough. A new version called CSA V2 uses the full range of 56 bits. A newer version CSA V3, using a 128 bit key, should be deployed in the coming years [217].

  6. 6.

    Currently, STMicroelectronics and Broadcom, two IC manufacturers, dominate the market of SoC dedicated to STB.

  7. 7.

    “Who wants peace, prepares for war.”

  8. 8.

    A demodulator is an electronic circuit that extracts information from the modulated carrier.

  9. 9.

    CENELEC is the European Committee for Electrotechnical Standardization and is responsible for standardization in the electrotechnical engineering field.

  10. 10.

    The explanations will be simplified without going down to the detailed protocols and algorithms.

  11. 11.

    CI+ uses a different vocabulary than this one, but the semantics is identical. For the sake of clarity, we use the usual CCI vocabulary.

  12. 12.

    The possibility of revoking in one unique CRL a complete set of hosts belonging to one model or even one brand name was too dangerous. If ever an attacker was able to forge such a CRL, then she could create a lethal class attack. The same scenario could occur with a human error. Therefore, the designers of CI+ had to add the Certification White List to possibly counter such class attacks. The usual answer to such an attack is to avoid the granularity of models and brands.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eric Diehl .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Diehl, E. (2012). Protection in Broadcast. In: Securing Digital Video. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17345-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17345-5_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17344-8

  • Online ISBN: 978-3-642-17345-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics