ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf

上传人:孙刚 文档编号:798580 上传时间:2019-02-02 格式:PDF 页数:26 大小:138.56KB
下载 相关 举报
ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf_第1页
第1页 / 共26页
ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf_第2页
第2页 / 共26页
ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf_第3页
第3页 / 共26页
ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf_第4页
第4页 / 共26页
ITU-T J 1002-2013 Pairing protocol specification for renewable conditional access system (Study Group 9)《可再生条件接入系统的配对协议规范 9号研究组》.pdf_第5页
第5页 / 共26页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T J.1002TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2013) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Conditional access and protection Pairing protocol specification for renewable conditiona

2、l access system Recommendation ITU-T J.1002 Rec. ITU-T J.1002 (03/2013) i Recommendation ITU-T J.1002 Pairing protocol specification for renewable conditional access system Summary Recommendation ITU-T J.1002 specifies the pairing protocol that supports the conditional access module (CAM) and descra

3、mbler (DSC) pairing function, which is specified in Recommendation ITU-T J.1001. History Edition Recommendation Approval Study Group 1.0 ITU-T J.1002 2013-03-01 9 ii Rec. ITU-T J.1002 (03/2013) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the f

4、ield of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standard

5、izing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is cover

6、ed by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indica

7、te both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved

8、 when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PRO

9、PERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asser

10、ted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that

11、this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2013 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. I

12、TU-T J.1002 (03/2013) iii Table of Contents Page 1 Scope 1 2 References. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 1 3.3 Security symbols 2 3.4 Parameter definitions 2 3.5 Security function definitions 3 4 Abbreviations and acronyms 3 5 Conventions 3

13、6 Overview of RCAS pairing protocol 4 7 Details of RCAS pairing protocol. 5 7.1 Initialization 5 7.2 Pairing . 6 7.3 CWEK generation 10 8 CAM and DSC interface message format and encryption 12 8.1 DscCertReq message 13 8.2 DscCertRsp message 13 8.3 CWEKGenInfo message 14 8.4 CWEKGenInfoCnfm message

14、. 14 Appendix I The functional structures for the CAM and DSC 16 I.1 Functional structure for CAM 16 I.2 Functional structure for DSC 17 Bibliography. 18 iv Rec. ITU-T J.1002 (03/2013) Introduction Recommendation ITU-T J.1001 specifies the requirements for renewable conditional access system (RCAS),

15、 and it identifies the pairing protocol that is one of the functional requirements. The RCAS is a new paradigm technology for renewing conditional access (CA) client software by securely downloading the new version of software through the digital cable two-way environment. The benefit of RCAS is tha

16、t no additional budget is required for issuing a new security hardware module when the multiple systems operator (MSO) wants to upgrade the old CA client software to a new one. The pairing protocol is an authentication protocol between the conditional access module (CAM) and descrambler (DSC). The a

17、uthentication process between the CAM and DSC is one of the most important security requirements for the RCAS. If the pairing is not performed properly, it may cause a control word (CW) disclosure problem. For example, a hacked DSC could intercept CWs transferred from the CAM through impersonation a

18、ttack. As a result, a hacker could watch pay broadcasting programs without proper entitlement by taking advantage of the intercepted CW. If the pairing is not performed properly, this may cause another problem of managing paid-viewers. For example, a malicious user could remove the physically-implem

19、ented CAM from one set-top box that stores entitlement information, and connect the removed CAM to another set-top box. Then a malicious user could watch pay broadcasting programs on multiple set-top boxes with one CAM. As a result, MSO cannot properly manage pay subscribers, and undergoes unwanted

20、business losses. To prevent the above drawbacks, a pairing protocol is specified in this Recommendation, which can provide a mutual authentication and security channel establishment between the CAM and the DSC. Using the pairing protocol can efficiently prevent a hacked DSC from eavesdropping CWs, w

21、hich are transferred from the CAM to DSC, as well as unwanted usage of one CAM to multiple set-top boxes. Rec. ITU-T J.1002 (03/2013) 1 Recommendation ITU-T J.1002 Pairing protocol specification for renewable conditional access system 1 Scope This Recommendation specifies the pairing protocol that p

22、rovides the conditional access module (CAM) and descrambler (DSC) pairing function of renewable conditional access system (RCAS), which is specified in ITU-T J.1001. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, consti

23、tute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Rec

24、ommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T J.1001 Recommendation ITU-T J.1001 (20

25、12), Requirements for renewable conditional access system. ITU-T X.509 Recommendation ITU-T X.509 (2008) | ISO/IEC 9594-8:2008, Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks. 3 Definitions 3.1 Terms defined elsewhere This Recommend

26、ation uses the following terms defined elsewhere: 3.1.1 conditional access (CA) b-ITU-T J.193: The conditional granting of access to cable services and content based upon what service suite has been purchased by the customer. 3.1.2 descrambling b-ITU-T J.93: The processes of reversing the scrambling

27、 function (see “scrambling“) to yield usable pictures, sound, and data services. 3.1.3 entitlement control messages (ECMs) b-ITU-T J.290: An ECM is an encrypted message that contains access criteria to various service tiers and a control word (CW). 3.1.4 entitlement management messages (EMMs) b-ITU-

28、T J.290: The EMM contains the actual authorization data and shall be sent in a secure method to each CPE device. 3.1.5 scrambling b-ITU-T J.93: The process of using an encryption function to render television and data signals unusable to unauthorized parties. 3.2 Terms defined in this Recommendation

29、 This Recommendation defines the following terms: 3.2.1 authorization centre (AC): An entity which issues identification information of CAM and performs authentication process when CAM requests renewing of CACS. 3.2.2 conditional access module (CAM): A cryptographic functional module which is locate

30、d in set-top boxes, whose main function is entitlement validation, key management and authentication. Set-top boxes can have one chip of secure hardware that includes the functions of CAM and 2 Rec. ITU-T J.1002 (03/2013) descrambler, or physically separated CAM in the form of a secure hardware IC o

31、r smart-card. The form of CAM can be determined by the policy of the MSO or CAS vendor. 3.2.3 conditional access client software (CACS): An image of conditional access client software code downloaded onto the CRS CAM. 3.2.4 control word (CW): The value which is used to scramble and descramble transp

32、ort streams; it is refreshed frequently during the service operation to enhance security. 3.3 Security symbols Security symbols Descriptions Pub(X) RSA public key of X Prv(X) RSA private key of X E(k,m) Encryption of a message m with key k. RSAES-OAEP is used to encrypt a message when the encryption

33、 key is a public key. AES-ECB is used to encrypt a message when the encryption key is a symmetric key S(k,m) Digital signature for a message m with signing key k. RSASSA-PSS is used for message signing H(m) SHA-256 hashing for a message m HMAC(k,m) HMAC-SHA1 for a message m with key k X|Y Concatenat

34、ion of X and Y Cert(X) ITU-T X.509 certificate of X PRF(X) Pseudo random function having a seed value of X Xmsb(Y)Y bits from MSB of X 3.4 Parameter definitions Parameter names Descriptions DSC_ID The value of identification of DSC having a size of 40 bytes CAM_ID The value of identification of CAM

35、having a size of 8 bytes KeyPairingID The value of concatenation with CAM_ID and DSC_ID, i.e., CAM_ID|DSC_ID CWEK The abbreviation of control words encryption key, and used to encrypt control words The CWEK generation method is CWEK = H(CWEK|CAM_ID|DSC_ID)msb(128)KPK The abbreviation of key pairing

36、key. The AC generates the KPK if KeyPairingID is valid HMAC_KEY An HMAC secret key. The CAM uses HMAC_KEY to generate an HMAC value for the message including control words The HMAC_KEY generation method is HMAC_KEY = H(RANDHMAC|CAM_ID|DSC_ID)msb(160), Here RANDHMACis achieved by PRF(X)msb(320)RAND A

37、 random number with 320 bits KiThe pre-shared key having the size of 128 bits. AC uniquely assigns three Kito each CAM Rec. ITU-T J.1002 (03/2013) 3 3.5 Security function definitions Security functions Requirements RSA digital signature (RSASSA-PSS) Modulus (n): 1024 bits Exponent: F4 (65537) Messag

38、e Encoding: RSASSA-PSS Hash algorithm (default): SHA-1 MGF (default): MGF1 with SHA-1 Trailer field: 1 (corresponds to 0xbc) Salt length: 160/8 = 20 bytes RSA encryption (RSAES-OAEP) Modules (n): 1024 bits Exponent: F4 (65537) MGF1 with SHA-1 for the mask generation function The empty string for the

39、 encoding parameter string AES encryption Block cipher mode: AES 128 ECB 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AC Authorization Centre AES Advanced Encryption Standard CACS Conditional Access Client Software CAM Conditional Access Module CASS

40、 CAM Authentication Sub-System CW Control Word CWEK Control Words Encryption Key DSC Descrambler ECB Electric Code Block HMAC Hashed Message Authentication Code KPK Key Pairing Key MSO Multiple Systems Operator PSI Pairing Status Information RCAS Renewable Conditional Access System 5 Conventions In

41、this Recommendation: The keywords “is required to“ indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this Recommendation is to be claimed. The keywords “is recommended“ indicate a requirement which is recommended but which is not absolu

42、tely required. Thus this requirement need not be present to claim conformance. The keywords “is prohibited from“ indicate a requirement which must be strictly followed and from which no deviation is permitted if conformance to this Recommendation is to be claimed. 4 Rec. ITU-T J.1002 (03/2013) The k

43、eywords “can optionally“ indicate an optional requirement which is permissible, without implying any sense of being recommended. This term is not intended to imply that the vendors implementation must provide the option and the feature can be optionally enabled by the network operator/service provid

44、er. Rather, it means the vendor may optionally provide the feature and still claim conformance with the specification. In the body of this Recommendation and its annexes, the words shall, shall not, should, and may sometimes appear, in which case they are to be interpreted, respectively, as is requi

45、red to, is prohibited from, is recommended, and can optionally. The appearance of such phrases or keywords in an appendix or in material explicitly marked as informative is to be interpreted as having no normative intent. 6 Overview of RCAS pairing protocol The components of RCAS that participate in

46、 the pairing protocol are the CAM authentication sub-system, authorization centre, CAM and descrambler of RCAS, as shown in Figure 1. J.1002(13)_F01CRS headendCAM authenticationsub-systemAuthorizationcentreSecure CACSdownloadsub-systemCASoperationblockContentsourcesBillingHeadendCAS system(including

47、 scrambler)Encrypted contentECM/EMMSecure channelCA client S/WAuthentication and CACSencryption key establishmentHeadendCustomer premisesClientCASblockCRS set-top boxCAMCWClearcontentoutputTVDescramblerCable network(two-waynetwork(e.g.,DOCSIS) for CRS)Figure 1 Reference architecture of the RCAS and

48、RCAS pairing protocol components The specification of RCAS pairing function includes: A pairing protocol that supports CAM and DSC pairing: The participants of the protocol should be authorization centre (AC), CAM authentication sub-system (CASS), CAM and DSC. A control words encryption key (CWEK) e

49、stablishment protocol: If the control words are delivered in plaintext from CAM to DSC, a malicious user could possibly watch pay programmes by using the disclosed control words for decrypting the scrambled video streams. Therefore, the CAM must provide confidentiality for the control words by encrypting them with the CWEK. AC participation in CWEK establishment: Since a successful CWEK establishment between CAM and DSC means that the CAM believes the DSC as its correct p

展开阅读全文
相关资源
猜你喜欢
  • DIN ISO 20280-2010 Soil quality - Determination of arsenic antimony and selenium in aqua regia soil extracts with electrothermal or hydride-generation atomic absorption spectrometr.pdf DIN ISO 20280-2010 Soil quality - Determination of arsenic antimony and selenium in aqua regia soil extracts with electrothermal or hydride-generation atomic absorption spectrometr.pdf
  • DIN ISO 20282-1-2008 Ease of operation of everyday products - Part 1 Design requirements for context of use and user characteristics (ISO 20282-1 2006) English version of DIN ISO 2.pdf DIN ISO 20282-1-2008 Ease of operation of everyday products - Part 1 Design requirements for context of use and user characteristics (ISO 20282-1 2006) English version of DIN ISO 2.pdf
  • DIN ISO 20369-2012 Material used for producing wrappings for cigarette filters cigarettes and other tobacco products - Determination of citrate content (ISO 20369 2009)《卷烟滤嘴 卷烟和其它烟.pdf DIN ISO 20369-2012 Material used for producing wrappings for cigarette filters cigarettes and other tobacco products - Determination of citrate content (ISO 20369 2009)《卷烟滤嘴 卷烟和其它烟.pdf
  • DIN ISO 20370-2012 Material used for producing wrappings for cigarette filters cigarettes and other tobacco products - Determination of acetate content (ISO 20370 2009)《生产香烟过滤嘴 香烟及.pdf DIN ISO 20370-2012 Material used for producing wrappings for cigarette filters cigarettes and other tobacco products - Determination of acetate content (ISO 20370 2009)《生产香烟过滤嘴 香烟及.pdf
  • DIN ISO 20401-2007 Pneumatic fluid power systems - Directional control valves - Specification of pin assignment for electrical round connectors of diameters 8 mm and 12 mm (ISO 204 .pdf DIN ISO 20401-2007 Pneumatic fluid power systems - Directional control valves - Specification of pin assignment for electrical round connectors of diameters 8 mm and 12 mm (ISO 204 .pdf
  • DIN ISO 20481-2011 Coffee and coffee products - Determination of the caffeine content using high performance liquid chromatography (HPLC) - Reference method (ISO 20481 2008)《咖啡和咖啡产.pdf DIN ISO 20481-2011 Coffee and coffee products - Determination of the caffeine content using high performance liquid chromatography (HPLC) - Reference method (ISO 20481 2008)《咖啡和咖啡产.pdf
  • DIN ISO 2049-2001 Petroleum products - Determination of colour (ASTM scale) (ISO 2049 1996)《石油产品 颜色的测定(ASTM 刻度)》.pdf DIN ISO 2049-2001 Petroleum products - Determination of colour (ASTM scale) (ISO 2049 1996)《石油产品 颜色的测定(ASTM 刻度)》.pdf
  • DIN ISO 20712-2-2008 Water safety signs and beach safety flags - Part 2 Specifications for beach safety flags - Colour shape meaning and performance (ISO 20712-2 2007)《水域安全标志和沙滩安全标.pdf DIN ISO 20712-2-2008 Water safety signs and beach safety flags - Part 2 Specifications for beach safety flags - Colour shape meaning and performance (ISO 20712-2 2007)《水域安全标志和沙滩安全标.pdf
  • DIN ISO 20712-3-2015 Water safety signs and beach safety flags - Part 3 Guidance for use (ISO 20712-3 2014)《水域安全标志和沙滩安全标志 第3部分 使用指南(ISO 20712-3-2014)》.pdf DIN ISO 20712-3-2015 Water safety signs and beach safety flags - Part 3 Guidance for use (ISO 20712-3 2014)《水域安全标志和沙滩安全标志 第3部分 使用指南(ISO 20712-3-2014)》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1