Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices
In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing ma...
Gespeichert in:
Veröffentlicht in: | ETRI journal 2010-04, Vol.32 (2), p.204-213 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | kor |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control. |
---|---|
ISSN: | 1225-6463 2233-7326 |