Pirate Card Rejection

  • David M. Goldschlag
  • David W. Kravitz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1820)


Renewable security cards provide the primary security protection in conditional access (CA) systems. Since the legitimate cards are intended to be inexpensive to produce, easy to distribute, and user-installable via externally accessible slots, sales of counterfeit cards may offer the pirate a profitable business. However, since the legitimate infrastructure is likely to be backed by a significant operating budget, it is reasonable to design that infrastructure to detect and reject counterfeit cards. Such an infrastructure would require customers of the pirate to use pirated hosts as well as pirated cards. This secondary security layer increases the pirate’s cost of doing business, and may therefore reduce the amount of piracy. This paper presents a protocol that the legitimate infrastructure can use to detect and reject content decrypted by counterfeit cards.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Diffie-Hellman - Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Hash - Akl, S.G.: On the Security of Compressed Encodings. In: Advances in Cryptology: Proceedings of Crypto 1983, pp. 209–230. Plenum Press, New York (1984)Google Scholar
  3. 3.
    Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Advances in Cryptology - CRYPTO 1986 Proceedings, pp. 186–194. Springer, Heidelberg (1987)Google Scholar
  4. 4.
    EIA-679, National Renewable Security Standard (NRSS) Parts A and B (March 1998)Google Scholar
  5. 5.
    Open Verifier Functionality in Consumer Electronics Devices, GD-T204, Release B, News Data Systems, Ltd.Google Scholar
  6. 6.
    ISO 7816 Identification Cards, Integrated Circuit Cards with Contact (1987)Google Scholar
  7. 7.
    Technical Specification of DVB Simulcrypt, DVB Document A028 (May 1997)Google Scholar
  8. 8.
    Hofter, C.: Security in Simulcrypt Protocols—Encryption and Authentication (inp009a), 11th Simulcrypt Technical Group Meeting, EBU, Geneva, July 23-24 (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • David M. Goldschlag
    • 1
  • David W. Kravitz
    • 1
  1. 1.DivxHerndonUSA

Personalised recommendations