Abstract
Renewable security cards provide the primary security protection in conditional access (CA) systems. Since the legitimate cards are intended to be inexpensive to produce, easy to distribute, and user-installable via externally accessible slots, sales of counterfeit cards may offer the pirate a profitable business. However, since the legitimate infrastructure is likely to be backed by a significant operating budget, it is reasonable to design that infrastructure to detect and reject counterfeit cards. Such an infrastructure would require customers of the pirate to use pirated hosts as well as pirated cards. This secondary security layer increases the pirate’s cost of doing business, and may therefore reduce the amount of piracy. This paper presents a protocol that the legitimate infrastructure can use to detect and reject content decrypted by counterfeit cards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diffie-Hellman - Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Hash - Akl, S.G.: On the Security of Compressed Encodings. In: Advances in Cryptology: Proceedings of Crypto 1983, pp. 209–230. Plenum Press, New York (1984)
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Advances in Cryptology - CRYPTO 1986 Proceedings, pp. 186–194. Springer, Heidelberg (1987)
EIA-679, National Renewable Security Standard (NRSS) Parts A and B (March 1998)
Open Verifier Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.
ISO 7816 Identification Cards, Integrated Circuit Cards with Contact (1987)
Technical Specification of DVB Simulcrypt, DVB Document A028 (May 1997)
Hofter, C.: Security in Simulcrypt Protocols—Encryption and Authentication (inp009a), 11th Simulcrypt Technical Group Meeting, EBU, Geneva, July 23-24 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goldschlag, D.M., Kravitz, D.W. (2000). Pirate Card Rejection. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_12
Download citation
DOI: https://doi.org/10.1007/10721064_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive