Skip to main content

Pirate Card Rejection

  • Conference paper
Smart Card Research and Applications (CARDIS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1820))

  • 1284 Accesses

Abstract

Renewable security cards provide the primary security protection in conditional access (CA) systems. Since the legitimate cards are intended to be inexpensive to produce, easy to distribute, and user-installable via externally accessible slots, sales of counterfeit cards may offer the pirate a profitable business. However, since the legitimate infrastructure is likely to be backed by a significant operating budget, it is reasonable to design that infrastructure to detect and reject counterfeit cards. Such an infrastructure would require customers of the pirate to use pirated hosts as well as pirated cards. This secondary security layer increases the pirate’s cost of doing business, and may therefore reduce the amount of piracy. This paper presents a protocol that the legitimate infrastructure can use to detect and reject content decrypted by counterfeit cards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie-Hellman - Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  2. Hash - Akl, S.G.: On the Security of Compressed Encodings. In: Advances in Cryptology: Proceedings of Crypto 1983, pp. 209–230. Plenum Press, New York (1984)

    Google Scholar 

  3. Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Advances in Cryptology - CRYPTO 1986 Proceedings, pp. 186–194. Springer, Heidelberg (1987)

    Google Scholar 

  4. EIA-679, National Renewable Security Standard (NRSS) Parts A and B (March 1998)

    Google Scholar 

  5. Open Verifier Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.

    Google Scholar 

  6. ISO 7816 Identification Cards, Integrated Circuit Cards with Contact (1987)

    Google Scholar 

  7. Technical Specification of DVB Simulcrypt, DVB Document A028 (May 1997)

    Google Scholar 

  8. Hofter, C.: Security in Simulcrypt Protocols—Encryption and Authentication (inp009a), 11th Simulcrypt Technical Group Meeting, EBU, Geneva, July 23-24 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goldschlag, D.M., Kravitz, D.W. (2000). Pirate Card Rejection. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_12

Download citation

  • DOI: https://doi.org/10.1007/10721064_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67923-3

  • Online ISBN: 978-3-540-44534-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics