ImageVerifierCode 换一换
格式:PDF , 页数:20 ,大小:454.74KB ,
资源ID:1046315      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1046315.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(SMPTE RDD 20-2010 Cinelink 2 Specification《Cinelink 2规范》.pdf)为本站会员(花仙子)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

SMPTE RDD 20-2010 Cinelink 2 Specification《Cinelink 2规范》.pdf

1、 Copyright 2010 by THE SOCIETY OF MOTION PICTURE AND TELEVISION ENGINEERS 3 Barker Avenue., White Plains, NY 10601 (914) 761-1100 Approved April 12, 2010 The attached document is a Registered Disclosure Document prepared by the proponent identified below. It has been examined by the appropriate SMPT

2、E Technology Committee and is believed to contain adequate information to satisfy the objectives defined in the Scope, and to be technically consistent. This document is NOT a Standard, Recommended Practice or Engineering Guideline, and does NOT imply a finding or representation of the Society. Erro

3、rs in this document should be reported to the proponent identified below, with a copy to engsmpte.org. All other inquiries in respect of this document, including inquiries as to intellectual property requirements that may be attached to use of the disclosed technology, should be addressed to the pro

4、ponent identified below. Proponent contact information: Reiner Doetzkies Texas Instruments 6550 Chase Oaks Blvd. Plano, TX 75023 Email Page 1 of 20 pages SMPTE RDD 20:2010 SMPTE REGISTERED DISCLOSURE DOCUMENT Cinelink 2 Specification SMPTE RDD 20:2010 Page 2 of 20 pages Table of Contents Page Intro

5、duction 3 1 Scope 3 2 Conformance Notation 3 3 Normative References 3 4 Glossary of Terms and Acronyms 4 5 System Description . 4 5.1 AES Counter Definition . 7 5.2 AES Stream to Plaintext/Ciphertext Mapping Definition 7 5.3 Link Encryption Key Message Definition 11 5.4 Link Encryption Metadata Defi

6、nition . 12 5.5 Encryption Modulator and Decryption Demodulator Definition 16 Annex A LUT Definition (Normative) 18 Annex B LUT Data (Normative) 19 Annex C Bibliography (Informative) 20 SMPTE RDD 20:2010 Page 3 of 20 pages Introduction Cinelink 2 is a protocol used to protect copyrighted images betw

7、een a playback server and DLP Cinema projector system. The images are protected on a local video data link via an AES key stream generator operating in counter mode. 1 Scope This document provides details of the implementation of the Cinelink 2 Link Encryption from Texas Instruments. 2 Conformance N

8、otation Normative text is text that describes elements of the design that are indispensable or contains the conformance language keywords: “shall“, “should“, or “may“. Informative text is text that is potentially helpful to the user, but not indispensable, and can be removed, changed, or added edito

9、rially without affecting interoperability. Informative text does not contain any conformance keywords. All text in this document is, by default, normative, except: the Introduction, any section explicitly labeled as “Informative“ or individual paragraphs that start with “Note: The keywords “shall“ a

10、nd “shall not“ indicate requirements strictly to be followed in order to conform to the document and from which no deviation is permitted. The keywords, “should“ and “should not“ indicate that, among several possibilities, one is recommended as particularly suitable, without mentioning or excluding

11、others; or that a certain course of action is preferred but not necessarily required; or that (in the negative form) a certain possibility or course of action is deprecated but not prohibited. The keywords “may“ and “need not“ indicate courses of action permissible within the limits of the document.

12、 The keyword reserved indicates a provision that is not defined at this time, shall not be used, and may be defined in the future. The keyword forbidden indicates reserved and in addition indicates that the provision will never be defined in the future. A conformant implementation according to this

13、document is one that includes all mandatory provisions (“shall“) and, if implemented, all recommended provisions (“should“) as described. A conformant implementation need not implement optional provisions (“may“) and need not implement them as described. Unless otherwise specified, the order of prec

14、edence of the types of normative information in this document shall be as follows: Normative prose shall be the authoritative definition; Tables shall be next; followed by formal languages; then figures; and then any other language forms. 3 Normative References The following standards contain provis

15、ions which, through reference in this text, constitute provisions of this registered disclosure document. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this recommended practice are encouraged to investigate t

16、he possibility of applying the most recent edition of the standards indicated below. SMPTE 291M-2006, Television Ancillary Data Packet and Space Formatting SMPTE 292-2008, 1.5 Gb/s Signal/Data Serial Interface SMPTE RDD 20:2010 Page 4 of 20 pages SMPTE 372-2009, Dual Link 1.5 Gb/s Digital Interface

17、for 1920 1080 and 2048 1080 Picture Formats AES, FIPS PUB 197, Advanced Encryption Standard. U.S. Department of Commerce/National Institute of Standards and Technology. http:/csrc.nist.gov/publications/fips/fips197/fips-197.pdf 4 Glossary of Terms and Acronyms 292: SMPTE interface specification for

18、HD-SDI (used interchangeably with HD-SDI) AES: Advanced Encryption Standard DLP: Digital Light Processing DVI: Digital Visual Interface HD-SDI: High Definition Serial Data Interface (used interchangeably with 292) LE keys: Link Encryption keys TLS: Transport Layer Security 5 System Description A sys

19、tem block diagram of a typical Cinelink 2 system is given in Figure 1. Figure 1 Cinelink 2 Typical Application SMPTE RDD 20:2010 Page 5 of 20 pages A Cinelink 2 system consists of an encryption engine in the server, a channel, and a decryption engine in the projector. The encryption engine is depict

20、ed in Figure 2. Figure 2 Encryption Engine The basic structure of the encryption and decryption engine is symmetric. The decryption engine is depicted in Figure 3. SMPTE RDD 20:2010 Page 6 of 20 pages Figure 3 Decryption Engine The encryption/decryption engine structure consists of an AES stream gen

21、erator block and three modulator/demodulators. The AES stream generator creates two or three (depending on the mode) 10-bit streams of random numbers at the input pixel rate based on an AES core operating in counter mode with an input of the 128-bit AES key and the 128-bit AES counter. The AES rando

22、m number streams then modulate/demodulate the incoming input pixels to encrypt/decrypt them. A HD-SDI link has a set of 8 prohibited codes not for use other than sync words. These hex values are 000h, 001h, 002h, 003h, 3FCh, 3FDh, 3FEh, and 3FFh. Thus, the encryption engine must not generate any of

23、these invalid codes. The structure of the engine allows for invalid codes to be detected and discarded in the AES random number stream before modulating/demodulating the incoming data. The presence and discarding of invalid codes will require the AES core to operate 0.8% faster than the source data

24、bit stream. For dual-link HD-SDI, each channel is encrypted/decrypted independently. For DVI source data streams, invalid code detection and discarding is not required and will be disabled. A secured TLS Ethernet connection is used for key exchange between the server and projector. The details of th

25、is connection are beyond the scope of this specification. All SMPTE image formats defined by the normative references are supported by Cinelink 2. SMPTE RDD 20:2010 Page 7 of 20 pages 5.1 AES Counter Definition Table 1 defines the AES counter. Note that the least significant bits of the counter are

26、the cipher block count. The definition of the AES counter is given Table 1. Table 1 AES Counter TI AES COUNTER DEFINITION AES INPUT BIT AES INPUT NAME DESCRIPTION 127:126 LINK_NUMBER_1:0 0=SINGLE LINK OR LINK A OF DUAL LINK, 1= LINK B OF DUAL LINK, 2-3= RESERVED 125:120 RESERVED 0=DEFAULT 119:56 LE_

27、ATTRIBUTE_DATA_63:0 ATTRIBUTE DATA EXTRACTED FROM LE KEY 55:32 FRAME_COUNT_23:0 NUMBER OF FRAMES FROM THE PREVIOUS KEY CHANGE, RESET TO ZERO AT KEY CHANGE 31:16 LINE_COUNT_15:0 ACTIVE VIDEO LINE NUMBER, RESET TO ZERO FOR THE FIRST LINE OF EVERY FRAME 15:0 CIPHER_BLOCK_COUNT_15:0 NUMBER OF CIPHER BLO

28、CKS, RESET TO ZERO FOR THE FIRST BLOCK OF EVERY LINE 5.2 AES Stream to Plaintext/Ciphertext Mapping Definition The AES core generates a 128-bit output for each AES key and AES counter input. These 128-bit output blocks are called cipher blocks. The conversion of these 128-bit cipher blocks into 10-b

29、it random number streams in the presence of invalid codes is illustrated for 10-bit data words in the following Figure 4. In the AES stream invalid codes are defined to be 3FFh, 3FEh, 3FDh, 3FCh, 3FBh, 3FAh, 3F9h, and 3F8h. When an invalid code in the AES stream is detected, it is simply discarded a

30、nd replaced with the next code in the stream. Note that 8 bits from each cipher block are not used. Figure 4 illustrates the AES to data word mapping for SMPTE 292 source data. SMPTE RDD 20:2010 Page 8 of 20 pages Figure 4 AES to data word mapping for 292 Figure 5 illustrates the AES to data word ma

31、pping for DVI source data. Figure 5 DVI Mapping SMPTE RDD 20:2010 Page 9 of 20 pages The encryption/decryption engine is inherently a 10-bit engine and encrypts and decrypts in 10-bit words. To encrypt/decrypt 8-bit DVI video, the data must be mapped into the 10-bit words of the engine. The exact ma

32、pping between the AES cipher blocks and the incoming pixel data for DVI video is as follows in Table 2. Table 2 DVI Image Mapping AES INPUT BIT 8 BIT 4:4:4 DVI Video PIX # BIT 0 0 B_0 1 0 B_1 2 0 B_2 3 0 B_3 4 0 B_4 5 0 B_5 6 0 B_6 7 0 B_7 8 0 NOT USED 9 0 NOT USED 10 0 G_0 11 0 G_1 12 0 G_2 13 0 G_

33、3 14 0 G_4 15 0 G_5 16 0 G_6 17 0 G_7 18 0 NOT USED 19 0 NOT USED 20 0 R_0 21 0 R_1 22 0 R_2 23 0 R_3 24 0 R_4 25 0 R_5 26 0 R_6 27 0 R_7 28 0 NOT USED 29 0 NOT USED 30 1 B_0 31 1 B_1 32 1 B_2 33 1 B_3 34 1 B_4 35 1 B_5 36 1 B_6 37 1 B_7 38 1 NOT USED 39 1 NOT USED 40 1 G_0 41 1 G_1 42 1 G_2 43 1 G_

34、3 44 1 G_4 SMPTE RDD 20:2010 Page 10 of 20 pages AES INPUT BIT 8 BIT 4:4:4 DVI Video PIX # BIT 45 1 G_5 46 1 G_6 47 1 G_7 48 1 NOT USED 49 1 NOT USED 50 1 R_0 51 1 R_1 52 1 R_2 53 1 R_3 54 1 R_4 55 1 R_5 56 1 R_6 57 1 R_7 58 1 NOT USED 59 1 NOT USED 60 2 B_0 61 2 B_1 62 2 B_2 63 2 B_3 64 2 B_4 65 2

35、B_5 66 2 B_6 67 2 B_7 68 2 NOT USED 69 2 NOT USED 70 2 G_0 71 2 G_1 72 2 G_2 73 2 G_3 74 2 G_4 75 2 G_5 76 2 G_6 77 2 G_7 78 2 NOT USED 79 2 NOT USED 80 2 R_0 81 2 R_1 82 2 R_2 83 2 R_3 84 2 R_4 85 2 R_5 86 2 R_6 87 2 R_7 88 2 NOT USED 89 2 NOT USED 90 3 B_0 91 3 B_1 92 3 B_2 93 3 B_3 94 3 B_4 95 3

36、B_5 96 3 B_6 97 3 B_7 98 3 NOT USED 99 3 NOT USED SMPTE RDD 20:2010 Page 11 of 20 pages AES INPUT BIT 8 BIT 4:4:4 DVI Video PIX # BIT 100 3 G_0 101 3 G_1 102 3 G_2 103 3 G_3 104 3 G_4 105 3 G_5 106 3 G_6 107 3 G_7 108 3 NOT USED 109 3 NOT USED 110 3 R_0 111 3 R_1 112 3 R_2 113 3 R_3 114 3 R_4 115 3

37、R_5 116 3 R_6 117 3 R_7 118 3 NOT USED 119 3 NOT USED 120 NOT USED NOT USED 121 NOT USED NOT USED 122 NOT USED NOT USED 123 NOT USED NOT USED 124 NOT USED NOT USED 125 NOT USED NOT USED 126 NOT USED NOT USED 127 NOT USED NOT USED 5.3 Link Encryption Key Message Definition The Link Encryption Key (LE

38、 key) is a 128-bit pseudo-random number used as the key for AES stream generator operating in counter mode. The same LE key used for encryption is required for decryption. The Link Encryption Attribute Data (LE attribute data) is a 64-bit parameter of the AES counter. It is required to use a random

39、number for this parameter that changes when the LE key changes. Each LE key will be identified by a 12-bit key ID. A LE Key ID of zero is defined as no encryption. Note: SMPTE 430-6 ASM defines the LE key ID parameters of the LEKeyLoadMessage as a 32-bit word, however only a 12-bit word is supported

40、 by the process defined in this document. The upper 20 bits of the LE Key ID will therefore be ignored. Also, note that a LE Key ID of zero is not permitted by this document; thus, an error response shall be returned if a LE Key ID value of zero is sent via ASM. All LE keys and LE attribute data for

41、 a movie may be sent before the start of the movie, or each individual LE key and LE attribute data may be sent before its corresponding movie clip. It is required that the LE key and LE attribute data be sent a minimum of 1 second before use. The LE key and LE attribute data are sent from the serve

42、r to the projector in a Link Encryption Key Message (LE key message) via the Ethernet connection. See SMPTE 430-6 ASM. SMPTE RDD 20:2010 Page 12 of 20 pages The current LE key ID as well as the next LE key ID for each video clip will be sent from the server to the projector via metadata . The projec

43、tor must be able to change LE keys, as identified by a new LE key ID within metadata, at any video frame boundary. All LE keys and LE attribute data stored in the projector are stored in volatile memory. In the event of loss of power to the projector, the LE keys and LE attribute data must be re-loa

44、ded into the projector. The LE Key data received from the server is mapped to the AES Key register in Table 3: Table 3 LE Key Data Mapping ASM Message (Byte order received) 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 AES Key 12 13 14 15 8 9 10 11 4 5 6 7 0 1 2 3 The LE Attribute Data received from the ser

45、ver is mapped to the AES Counter register in Table 4: Table 4 LE Attribute Data Mapping ASM Message (Byte order received) 0 1 2 3 4 5 6 7 AES Counter 4 5 5 7 0 1 2 3 5.4 Link Encryption Metadata Definition The link encryption metadata is used to transfer unencrypted time critical data from the serve

46、r to the projector. The items required for the LE metadata are given in Table 5. SMPTE RDD 20:2010 Page 13 of 20 pages Table 5 LE Metadata LE KEY METADATA ITEM DESCRIPTION SIZE NEXT_LE_KEY_ID LE_KEY_ID OF THE NEXT KEY 12 BITS CURRENT_LE_KEY_ID LE_KEY_ID OF THE CURRENT KEY 12 BITS CURRENT_FRAME_COUNT

47、 NUMBER OF FRAMES FROM THE PREVIOUS KEY CHANGE, RESET TO ZERO AT KEY CHANGE 24 BITS VERSION CURRENTLY SET TO ZERO 6 BITS LINK_NUMBER 0=SINGLE LINK OR LINK A OF DUAL LINK, 1= LINK B OF DUAL LINK, 2-3= RESERVED 2 BITS AES_SYNC_WORD THE VALID 10-BIT AES WORD DIRECTLY FOLLOWING THE AES WORD USED TO ENCR

48、YPT THE LAST ACTIVE PIXEL OF THE LAST ACTIVE LINE OF THE PREVIOUS FRAME. THIS WORD IS USED BY THE PROJECTOR TO VERIFY SYNCRONIZATION OF THE SERVER AND PROJECTOR AES RANDOM NUMBER GENERATORS. 10 BITS This data is used to execute LE key changes and to supply the projector with frame count and link num

49、ber components of the AES counter. This data is also used to verify the synchronization between the server and projector AES random number generators by comparing the AES_SYNC_WORD from the server (metadata) and the projector. In a dual-link mode, there is no requirement on LE key change timing between the two links. In fact, each link may have a different key. The projector shall generate the following status information relating to LE metadata. A current LE key error if the current LE

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1