1、 ETSI TR 102 825-6 V1.1.2 (2011-02)Technical Report Digital Video Broadcasting (DVB);Content Protection and Copy Management (DVB-CPCM);Part 6: CPCM Security Test VectorsETSI ETSI TR 102 825-6 V1.1.2 (2011-02)2Reference RTR/JTC-DVB-252-6 Keywords broadcast, DVB ETSI 650 Route des Lucioles F-06921 Sop
2、hia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org T
3、he present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI p
4、rinters of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.or
5、g/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing r
6、estriction extend to reproduction in all media. European Telecommunications Standards Institute 2011. European Broadcasting Union 2011. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GP
7、PTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by t
8、he GSM Association. ETSI ETSI TR 102 825-6 V1.1.2 (2011-02)3Contents Intellectual Property Rights 4g3Foreword . 4g3Introduction 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informative references 5g33 Definitions, abbreviations and notation 6g33.1 Definitions 6g33.2 Abbreviations
9、. 6g33.3 Notation 6g34 Test Vectors Cryptographic Algorithms 6g34.1 Hash Function 6g34.2 Message Authentication Code 6g34.3 Symmetric Cipher. 6g34.4 Revocation Lists Digital Signature . 7g34.5 MPEG-2 Transport Stream adaptation of the LSA . 8g34.6 Certificate Verification . 30g34.7 Certificate keys
10、and digest generation 33g35 Test Vectors Cryptographic Protocols 34g35.1 Authenticated Key Exchange (AKE) . 34g3History 39g3ETSI ETSI TR 102 825-6 V1.1.2 (2011-02)4Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The informa
11、tion pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ET
12、SI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000
13、 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by Joint Technical Committee (JTC) Broadcast of the European Broadcasting Union (EBU), Comit Europen de Normalisation ELECtrotech
14、nique (CENELEC) and the European Telecommunications Standards Institute (ETSI). NOTE: The EBU/ETSI JTC Broadcast was established in 1990 to co-ordinate the drafting of standards in the specific field of broadcasting and related fields. Since 1995 the JTC Broadcast became a tripartite body by includi
15、ng in the Memorandum of Understanding also CENELEC, which is responsible for the standardization of radio and television receivers. The EBU is a professional association of broadcasting organizations whose work includes the co-ordination of its members activities in the technical, legal, programme-m
16、aking and programme-exchange domains. The EBU has active members in about 60 countries in the European broadcasting area; its headquarters is in Geneva. European Broadcasting Union CH-1218 GRAND SACONNEX (Geneva) Switzerland Tel: +41 22 717 21 11 Fax: +41 22 717 24 81 The Digital Video Broadcasting
17、Project (DVB) is an industry-led consortium of broadcasters, manufacturers, network operators, software developers, regulatory bodies, content owners and others committed to designing global standards for the delivery of digital television and data services. DVB fosters market driven solutions that
18、meet the needs and economic circumstances of broadcast industry stakeholders and consumers. DVB standards cover all aspects of digital television from transmission through interfacing, conditional access and interactivity for digital video, audio and data. The consortium came together in 1993 to pro
19、vide global standardisation, interoperability and future proof specifications. The present document is part 6 of a multi-part deliverable. Full details of the entire series can be found in part 1 i.8. Introduction CPCM is a system for Content Protection and Copy Management of commercial digital cont
20、ent delivered to consumer products. CPCM manages content usage from acquisition into the CPCM system until final consumption, or export from the CPCM system, in accordance with the particular usage rules of that content. Possible sources for commercial digital content include broadcast (e.g. cable,
21、satellite, and terrestrial), Internet-based services, packaged media, and mobile services, among others. CPCM is intended for use in protecting all types of content - audio, video and associated applications and data. CPCM specifications facilitate interoperability of such content after acquisition
22、into CPCM by networked consumer devices for both home networking and remote access. This first phase of the specification addresses CPCM for digital Content encoded and transported by linear transport systems in accordance with TS 101 154 i.1. A later second phase will address CPCM for Content encod
23、ed and transported by systems that are based upon Internet Protocols in accordance with TS 102 005 i.2. ETSI ETSI TR 102 825-6 V1.1.2 (2011-02)51 Scope The present document specifies the Security Test Vectors for the Digital Video Broadcasting (DVB) Content Protection and Copy Management (CPCM) syst
24、em. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) a
25、pplies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative
26、 references The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular s
27、ubject area. i.1 ETSI TS 101 154: “Digital Video Broadcasting (DVB); Specification for the use of Video and Audio Coding in Broadcasting Applications based on the MPEG-2 Transport Stream“. i.2 ETSI TS 102 005: “Digital Video Broadcasting (DVB); Specification for the use of Video and Audio Coding in
28、DVB services delivered directly over IP protocols“. i.3 FIPS Publication 180-1 (1994): “Secure Hash Standard, National Institute of Standards and Technology“. NOTE: Available at http:/www.itl.nist.gov/fipspubs/fip180-1.htm. i.4 FIPS Publication 198 (2001): “The Keyed-Hash Message Authentication Code
29、 (HMAC), National Institute of Standards and Technology“. NOTE: Available at http:/csrc.nist.gov/publications/fips/fips198/fips-198a.pdf. i.5 FIPS Publication 197 (2001): “Advanced Encryption Standard, National Institute of Standards and Technology“. NOTE: Available at http:/csrc.nist.gov/publicatio
30、ns/fips/fips197/fips-197.pdf. i.6 FIPS Special Publication 800-38A (2001): “Recommendation for Block Cipher Modes of Operation“. NOTE: Available at http:/csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf. i.7 ETSI TS 102 825-5: “Digital Video Broadcasting (DVB); Content Protection and Copy M
31、anagement (DVB-CPCM); Part 5: CPCM Security Toolbox“. i.8 ETSI TS 102 825-1: “Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 1: CPCM Abbreviations, Definitions and Terms“. ETSI ETSI TR 102 825-6 V1.1.2 (2011-02)6i.9 PKCS #1 (V1.5): RSA Cryptography Standard
32、, Version 2.1, RSA Laboratories, 2002. NOTE: Available at ftp:/ 3 Definitions, abbreviations and notation 3.1 Definitions For the purposes of the present document, the terms and definitions given in TS 102 825-1 i.8 apply. 3.2 Abbreviations For the purposes of the present document, the abbreviations
33、 given in TS 102 825-1 i.8 apply. 3.3 Notation The Notation used in the present document is as defined in the DVB CPCM Security Toolkit (TS 102 825-5 i.7). Additional Notation specific for the present document is shown in Table 1. All numbers are represented using the big-endian convention. Table 1:
34、 Notation Scope Notation Meaning Scrambler test vector Block 16 bytes Residue 0-15 bytes partial block MSC Size of MSC data AF Adaptation Field size (= adaptation_field_length - 1) Payload Size of data after MSC part nSB Process n Super Blocks using RCBC nCBC Process n blocks using CBC CS(n) Ciphert
35、ext Stealing with n bytes 1B Process a single block SBH Small Block Handling 4 Test Vectors Cryptographic Algorithms 4.1 Hash Function The Test vectors for the CPCM Hash Algorithm can be found in i.3. 4.2 Message Authentication Code Test vectors for CPCM Message Authentication Code can be found in i
36、.4. 4.3 Symmetric Cipher Test vectors for AES can be found in i.5. Test Vectors for CBC mode can be found in i.6. ETSI ETSI TR 102 825-6 V1.1.2 (2011-02)74.4 Revocation Lists Digital Signature This clause contains the test data for creating and verifying the signature of a CPCM Revocation List as de
37、scribed in clause 4.4. in TS 102 825-5 i.7. It also shows the ADS digest created as described in clause 4.8 in TS 102 825-5 i.7. Table 2 contains a CPCM Revocation containing 2 Certificate Ids and 1 ADS digest, which is the Hash of the shown ADS. Table 3 contains the RSA keys that are used in the PK
38、CS #1 v1.5 process i.9. Table 2: Revocation List Signing and Verification data ADS 80 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f CPCM Revocation List part without the signature and ADS digest. 01 00 00 00 05 08 03 02 02 01 00 00 00 04 00 11 22 33 44 55 66 77 00 00 00 05 00 11 22 33 44 55 66 78 00
39、00 00 03 ADS digest 02 77 86 69 ac 01 22 48 ec 5c 67 06 fa b8 d5 fa f7 22 5d d0 Revocation list signature PKCS #1 v1.5 0e 81 ad 84 bb 6a 36 65 f6 00 e1 0c d7 a3 90 bb e0 0a da 8f ed 12 7b 44 f2 3a ce 02 cc f0 bb 22 ad 30 c9 55 82 50 85 ff e0 32 9b 9c e5 16 86 58 bd 92 c1 42 0c 17 0c 50 bf 59 18 67 1
40、d f3 4b a9 e1 97 29 06 8e e2 a3 c1 a2 49 91 39 a9 e8 62 91 d4 4c a7 03 35 45 10 8d bf 74 c5 bf a7 4c 95 3e 6f d7 5b da d9 be b9 fb be 3d 8d e3 81 70 d3 a5 82 95 ce 0a be 67 78 a2 37 30 08 30 2c d8 05 c7 0b 93 bf 74 bd 8c 51 92 71 93 1f 3d 6e c8 fc 00 9a 35 a6 3d bd ff b7 82 60 60 b2 68 2b 53 a4 fc 6
41、8 dd 84 9f ad c7 bd 13 de 43 de 3e 65 92 c6 43 c8 3e 9d 62 86 2b 3f 8a 16 26 a2 3d 5b 12 f3 2c 42 c4 20 64 d8 7e 19 04 a1 a3 a6 ec e1 aa 69 6e e9 e9 b9 c0 01 4e 95 f8 d6 bb c6 72 3f 32 89 a6 64 da 9f 90 e6 6e 61 94 af a4 43 eb 7f 35 36 09 da 96 e2 39 f1 6b a9 0c 5d 20 cc 11 a1 49 d4 72 Sha-1 digest
42、of message: H 23 14 c7 c0 86 4f 51 e2 88 28 46 7f 55 58 63 3b 27 41 99 a1 T = DER encoding of SHA-1 | H (see note) 30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 23 14 c7 c0 86 4f 51 e2 88 28 46 7f 55 58 63 3b 27 41 99 a1 Unsigned encoded message: EM = 0x00 | 0x01 | PS | 0x00 | T 00 01 ff ff ff ff ff
43、ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
44、ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
45、ff ff ff ff ff ff ff ff ff ff ff ff ff 00 30 21 30 09 06 05 2b 0e 03 02 1a 05 00 04 14 23 14 c7 c0 86 4f 51 e2 88 28 46 7f 55 58 63 3b 27 41 99 a1 NOTE: Regarding DER encoding of SHA-1, older versions of the PKCS #1 v1.5 have described the use of 0x1f instead of 0x09 as the fourth byte. ETSI ETSI TR
46、 102 825-6 V1.1.2 (2011-02)8Table 3: RSA keys used for PKCS1.5 public exponent e 216+ 1 = 65537 = 0x10001 modulus n d0 bb e8 f5 9b 64 4f 1b 9a 6b 6c 44 16 1a 17 cf ff 85 4d 2b f2 c0 59 89 e8 2b b6 b7 e7 ef 19 08 8d a2 16 34 95 5b a3 96 5f cb e8 07 0b d4 a8 6a 0a 82 f2 a7 55 34 71 d6 d9 cb 2e c8 8b 1
47、e f4 9d 4c ba 43 23 4a f8 63 a0 5b 04 44 11 cf 34 17 c4 3c 11 2c e6 52 81 44 72 f6 b1 c5 6d 7d 03 2f 13 cf 36 cc 9d 2b 26 d9 4e 8c 04 bc 17 93 bc f5 24 d6 ed e1 ab bd 0a 82 4f 4d f8 29 53 10 ba 90 f9 36 21 90 ec 97 e8 25 27 5e 7c ea a1 0a 1f 31 fc 15 01 d7 53 85 51 84 95 eb bb b6 14 ff 4a b8 b4 cf b
48、7 f1 37 c8 61 fb 9b 88 4c 4c 19 72 84 f8 df 6a 29 0a f5 ca d3 24 04 44 d2 c1 c3 83 4f 14 af d8 b6 9d 8c 86 16 2e 0f a1 23 bf 38 32 6e 72 71 c6 30 ec bd ac 08 38 e8 17 dd 2b 6d d3 a3 67 54 d6 8c af 73 1a 9d fa ff a0 d8 1f 11 4b 21 bf 9f 6c d1 87 d2 c2 ef 66 80 20 38 d8 03 47 36 47 e7 private exponent
49、 d ac 0b d6 6e 6a 90 79 6b e5 11 da 01 1c be 91 16 0e 24 cf 81 03 eb 6b 61 f2 0d e5 e3 1b b6 c5 c9 79 04 3a 8d 48 f6 69 95 ce 8c 01 49 9d 84 c0 f3 f6 8a 0c 7b c4 0d 20 2f d9 00 52 25 56 16 43 c5 4b b2 d3 17 c9 f9 86 14 6c 30 cd f2 67 f9 26 05 c7 04 d9 1f 56 ad d9 bf 70 7b 02 a1 c6 42 d3 90 de 60 ea b2 39 19 22 50 4d b4 b1 5c 35 97 af ef 97 80 27 5c 28 ca fa b1 67 30 be cf 0a a0 dc 50 30 28 4b ab a9 8f 76 1d b8 7c 55 95 6d a2 8d 62 ba ef 4b 93 a0 34 69 7e d2 d9 59 2