欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI GS ECI 001-5-2-2017 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 5 The Advanced Security System Sub-part 2 Key Ladder Block (V1 1 1).pdf

    • 资源ID:733248       资源大小:213.76KB        全文页数:23页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI GS ECI 001-5-2-2017 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 5 The Advanced Security System Sub-part 2 Key Ladder Block (V1 1 1).pdf

    1、 ETSI GS ECI 001-5-2 V1.1.1 (2017-07) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Part 5: The Advanced Security System; Sub-part 2: Key Ladder Block Disclaimer The present document has been produced and approved by the Embedded Common Interface (ECI) for exchangeable CA/DRM so

    2、lutions ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)2 Reference DGS/ECI-001-5-2 Keywords CA, DRM

    3、, swapping ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be download

    4、ed from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing o

    5、r perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject t

    6、o revision or change of status. Information on the current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People

    7、/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the wri

    8、tten authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. ETSI 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI register

    9、ed for the benefit of its Members and of the 3GPP Organizational Partners. oneM2M logo is protected for the benefit of its Members GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)3 Contents Intellectual Property Rights 6g3For

    10、eword . 6g3Modal verbs terminology 6g3Introduction 7g31 Scope 8g32 References 8g32.1 Normative references . 8g32.2 Informative references 8g33 Definitions and abbreviations . 9g33.1 Definitions 9g33.2 Abbreviations . 10g34 Chipset-ID and chipset master key pair 11g35 Key ladder 12g35.1 Overview 12g3

    11、5.2 Key ladder computations 13g35.3 Usage Rules Information 14g35.3.1 CW-URI 14g35.3.2 SPK-URI . 15g35.4 Additional key layers 16g35.4.1 Overview 16g35.4.2 Key ladder computations 16g35.5 Associated Data 2 . 17g36 Authentication mechanism . 18g36.1 Overview 18g36.2 Authentication mechanism computati

    12、ons . 19g37 Data conversion primitives . 20g37.1 BS2OSP 20g37.2 OS2BSP 20g37.3 I2BSP . 20g38 Cryptographic operations . 20g38.1 Symmetric encryption scheme . 20g38.2 Public-key encryption scheme 21g38.3 Digital signature scheme 21g38.4 Function h . 22g38.5 Message authentication code algorithm . 22g

    13、3History 23g3ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)4 List of Figures Figure 5.1-1: Key ladder .12g3Figure 5.4.1-1: Additional key layers 16g3Figure 5.5-1: Associated Data 2 17g3Figure 6.1-1: Authentication mechanism 18g3ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)5 List of Tables Table 5.3.1-1: Defi

    14、nition of CW-URI .15g3Table 5.3.2-1: Definition of SPK-URI 16g3ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)6 Intellectual Property Rights Essential patents IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs,

    15、 if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are avail

    16、able on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are

    17、, or may be, or may become, essential to the present document. Trademarks The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners. ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and convey

    18、s no right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks. Foreword This Group Specification (GS) has been produced by ETSI Indu

    19、stry Specification Group (ISG) Embedded Common Interface (ECI) for exchangeable CA/DRM solutions. The present document is part 5, sub-part 2 of a multi-part deliverable covering the ECI specific functionalities of an advanced security system, as identified below: Part 1: “Architecture, Definitions a

    20、nd Overview“; Part 2: “Use cases and requirements“; Part 3: “CA/DRM Container, Loader, Interfaces, Revocation“; Part 4: “The Virtual Machine“; Part 5: “The Advanced Security System: Sub-part 1: “ECI specific functionalities“; Sub-part 2: “Key Ladder Block“. Part 6: “Trust Environment“. Modal verbs t

    21、erminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowe

    22、d in ETSI deliverables except when used in direct citation. ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)7 Introduction A content provider encrypts their digital content and uses a content protection system in order to protect the content against unauthorized access. A consumer uses a content receiver t

    23、o access protected content. To this end, the content receiver contains a chipset that implements one or more content decryption operations. A cryptographic key establishment protocol is used to secure the transport of content decryption keys from the content protection system to the chipset. The ste

    24、ps of the protocol that are implemented within the chipset are referred to as a key ladder in the present document. The present document specifies a key ladder for the key establishment protocol presented in i.1. The key ladder and the protocol may also be used to secure the transport of content enc

    25、ryption keys to the chipset. Such keys are required for use cases in which the chipset re-encrypts content. The chipset may implement one or more content encryption operations for this purpose. Personal video recording and exporting protected content to a different content protection system are typi

    26、cal examples of content re-encryption use cases. Content decryption keys and content encryption keys are both referred to as control words throughout the present document. The present document also specifies an authentication mechanism. This mechanism is closely related to the key ladder and may be

    27、used for entity authentication; in other words, this mechanism may be used to authenticate the chipset. The key ladder and authentication mechanism specified in the present document are agnostic to both the content protection system and the content provider. This enables a content provider to use an

    28、y compliant content protection system, and it enables a consumer to use the content receiver for accessing content of any content provider that uses a compliant content protection system. A certification authority manages a public-key certificate of each chipset in the mechanisms specified in the pr

    29、esent document. In particular, the certification authority distributes such certificates and certificate revocation information to content providers that want to make use of the key ladder and/or the authentication mechanism. Next, the content providers use the certificates and certificate revocatio

    30、n information as input to their compliant content protection system; as detailed later, the knowledge of the public key in the certificate of a chipset enables the content protection system to generate suitable input messages for the chipsets key ladder and authentication mechanism. ETSI ETSI GS ECI

    31、 001-5-2 V1.1.1 (2017-07)8 1 Scope The present document specifies a key ladder block for implementation in a content receivers chipset. The key ladder block comprises a key ladder for securing the transport of control words to the chipset and an authentication mechanism. The present document also sp

    32、ecifies aspects of the personalization of a compliant chipset. The present document is intended for use by chipset manufacturers. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For spec

    33、ific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https:/docbox.etsi.org/Referenc

    34、e. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. 1 IEEE Standards AssociationTM: “Guidelines for Use Organizationa

    35、lly Unique Identifier (OUI) and Company ID (CID)“. NOTE: Available at https:/standards.ieee.org/develop/regauth/tut/eui.pdf. 2 RSA Laboratories: “PKCS #1 v2.2: RSA Cryptography Standard“. 3 NIST FIPS PUB 197: “Specification for the Advanced Encryption Standard (AES)“. 4 NIST FIPS PUB 180-4: “Secure

    36、Hash Standard (SHS)“. 5 NIST SP 800-107 Revision 1: “Recommendation for Applications Using Approved Hash Algorithms“. 6 ISO/IEC 9797-1:2011: “Information technology - Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher“. 2.2 Informative references Refe

    37、rences are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While

    38、any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 P. Roe

    39、lse: “A new key establishment protocol and its application in pay-TV systems“. i.2 ETSI TS 100 289: “Digital Video Broadcasting (DVB); Support for use of the DVB Scrambling Algorithm version 3 within digital broadcasting systems“. i.3 ETSI TS 103 127: “Digital Video Broadcasting (DVB); Content Scram

    40、bling Algorithms for DVB-IPTV Services using MPEG2 Transport Streams“. ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)9 i.4 ATSC Standard A/70 Part 1:2010: “Conditional Access System for Terrestrial Broadcast“. i.5 ISO/IEC 23001-7:2016: “Information technology - MPEG systems technologies - Part 7: Common

    41、encryption in ISO base media file format files“. i.6 Radio, Film and Television Industrial Standard of the Peoples Republic of China GY/T 277 - 2014: “Technical Specification of Digital Rights Management for Internet Television“. NOTE: This reference is only available in Chinese. 3 Definitions and a

    42、bbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: certification authority: party that is responsible for managing public-key certificates NOTE: A certification authority is trusted by all other parties in the system to perform operation

    43、s associated with certificates. chipset-ID: non-secret number that is used to identify a chipset content protection system: system that uses cryptographic techniques to manage access to digital content NOTE: Typically, a content protection system is either a conditional access system or a digital ri

    44、ghts management system. content provider: party that distributes digital content to a content receiver content receiver: device that is used to access digital content NOTE: A content receiver contains a chipset with a content descrambler. content descrambler: component in the chipset that is capable

    45、 of decrypting content NOTE: A content descrambler may also be capable of encrypting content (for the purpose of content re-encryption). In the present document, content encryption/decryption uses a symmetric encryption scheme. For MPEG-2 content, content encryption and decryption are also referred

    46、to as scrambling and descrambling, respectively. control word: secret key used to encrypt and decrypt content NOTE: In digital rights management systems, a control word is typically referred to as a content key. cryptographic hash function: unkeyed cryptographic function that takes data of arbitrary

    47、 size, referred to as the message, as input and produces an output data block of fixed size, referred to as the message digest NOTE: Assumed properties of the cryptographic hash function in the present document are: 1) the cryptographic hash function behaves as a random function; and 2) the cryptogr

    48、aphic hash function is second preimage resistant. digital signature scheme: keyed asymmetric cryptographic scheme that is used to protect the authenticity of data NOTE: A digital signature scheme consists of a key generation algorithm, a signature generation operation and a signature verification op

    49、eration. Keys are generated as (secret/private key, public key) pairs. The data is signed using a secret/private key and the corresponding public key is used to verify the signature. The digital signature scheme specified in the present document is used to protect the authenticity of messages as defined in i.1; in particular, the scheme is not used to provide non-repudiation or source authentication in the present document. ETSI ETSI GS ECI 001-5-2 V1.1.1 (2017-07)10 message authentication code algorithm: keyed symmetric cryptographic algo


    注意事项

    本文(ETSI GS ECI 001-5-2-2017 Embedded Common Interface (ECI) for exchangeable CA DRM solutions Part 5 The Advanced Security System Sub-part 2 Key Ladder Block (V1 1 1).pdf)为本站会员(eveningprove235)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开