ATIS 0800006-2010 IIF Default Scrambling Algorithm (IDSA) IPTV Interoperability Specification (Version 002).pdf
《ATIS 0800006-2010 IIF Default Scrambling Algorithm (IDSA) IPTV Interoperability Specification (Version 002).pdf》由会员分享,可在线阅读,更多相关《ATIS 0800006-2010 IIF Default Scrambling Algorithm (IDSA) IPTV Interoperability Specification (Version 002).pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0800006.v002 IIF DEFAULT SCRAMBLING ALGORITHM (IDSA) IPTV INTEROPERABILITY SPECIFICATION ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications ind
2、ustry. More than 250 companies actively formulate standards in ATIS 18 Committees, covering issues including: IPTV, Service Oriented Networks, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, and Billing and Operational Support. In addition, numerous Incubators, Focus and E
3、xploratory Groups address emerging industry priorities including “Green”, IP Downloadable Security, Next Generation Carrier Interconnect, IPv6 and Convergence. ATIS is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a member and major U.S. contributor to
4、the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). For more information, please visit . Notice of Disclaimer IPTV Receiving Device DRM Component; Broadcast Content Server; COD Repository; COD
5、Server (including all types of content - e.g., video, games, music); Server Side Middleware (Subscriber, Service, Asset Management System); IPTV Receiving Device (e.g., set-top box); and 3 IPTV Receiving Device Software. This document supports interoperability by specifying a default scrambling/de-s
6、crambling algorithm for the MPEG-2 Transport Stream and the scrambling algorithm signaling, which is part of the content flows that are highlighted in yellow in Figure 1 below. Figure 1: High-Level DRM Architecture The default scrambling/de-scrambling algorithm(s) is defined in more detail below. 1.
7、3.1 Scrambling Algorithm(s) To provide for the highest levels of security and performance, encryption and decryption are generally performed in hardware; therefore, there are generally a small number of scrambling algorithms deployed on a typical receivers hardware platform. To ensure compatibility
8、between different IPTV Receiving Device hardware platforms on an operators network, and to minimize the impact to the hardware, only a small number of scrambling algorithms will normally be utilized. The network operator will get maximum choice of IPTV Receiving Device platforms with the adoption an
9、d implementation of a standardized scrambling/de-scrambling algorithm(s). 4 1.3.2 Scrambling Algorithm Signaling For delivery of IPTV content, the ATIS IIF specifies the use of the standard DVB mechanism 5 for identification of the scrambling algorithm used to protect the associated elementary strea
10、ms of an MPEG-2 Transport Stream. The IPTV security solution specifies a single IIF Default Scrambling Algorithm for MPEG-2 Transport Streams, as well as permits the use of alternative scrambling algorithms such as those that require licensing or hardware-only implementation. All profiles of the IDS
11、A are known collectively as the IPTV Security Solution/Scrambling (ISS/S). In order to ensure interoperability, the ISS/S provides a signaling mechanism for the use of alternative scrambling algorithms. 2 ANALYSIS FOR INTEROPERABILITY 2.1 Introduction The IDSA MPEG-2 Transport Stream Profile has bee
12、n analyzed according to the following categories: Algorithm; Stream handling; and Implementation. 2.1.1 Analysis Criteria The following criteria were considered in the analysis of the ISS/S. 2.1.1.1 Algorithm The IDSA is based upon Advanced Encryption Standard (AES) as its basic building block which
13、 is a widely-accepted, standardized cryptographic algorithm that has had a thorough and expert design review to ensure cryptographic robustness. Base: The selected algorithm is AES, which is a publicly available cryptographic algorithm that has been standardized by the National Institute of Standard
14、s and Technology (NIST) as FIPS-197 1. Key Length: The entropy of the key selected is 128-bits, which is sufficient to protect the content fully from plausible threats. Mode: The cipher-block chaining (CBC) mode selected is sufficient to protect the content fully from plausible threats and covert ch
15、annel attacks. CBC mode is one of several standardized usage modes as specified in 2. Key Lifetime: The IDSA supports a flexible choice of key lifetime to ensure cryptographic robustness. 2.1.1.2 Stream Handling The IDSA is a self-contained, fully-specified algorithm that accepts as its input only a
16、 fixed Initialization Vector (IV), the content stream, and the key. Fully-specified means that all of the 5 parameters of this default scrambler are defined (e.g., IV generation, chaining mode, short-block handling, and residual bytes handling). Other than these parameters, no other external communi
17、cation or synchronization is required for interoperability. Residual Bytes Handling: The XOR method provides a cryptographically robust mechanism for protection of content data that arrives in length that is less than one full AES block size. o Short Block Handling: The XOR method provides a cryptog
18、raphically robust mechanism for protection of content data that arrives as the solitary data and has a length that is less than one full AES block size (i.e., 128-bits). o Initial Values: The IDSA defines a fixed or static IV of value 0 because: The IDSA provides cryptographic robustness against pla
19、usible threats in the context of dynamically streaming content. The use of a truly random IV, while providing enhanced entropy and thus security, is infeasible without putting external communications and synchronization demands and constraints on the IV solution. The IDSA solution enables the descra
20、mbling of content to begin at any MPEG-2 transport packet boundary which assures maximal random access. Packet Error Handling: In the IDSA, consideration of error propagation is limited to the context of transmission in MPEG-2 Transport Stream packets. The IDSA re-initializes the cipher block chain
21、at the beginning of each MPEG-2 Transport Stream packet to minimize error propagation, whether from packet loss or packet corruption. 2.1.1.3 Patent/Licensing The IDSA has been designed with the intent to produce a license and patent-free solution. Prior Art: The base algorithm, IV generation, and s
22、tream handling methods are well documented in textbooks and within existing standards. License: The algorithm was selected with the intent to be license-free. 2.1.1.4 Implementation The IDSA has been designed to utilize functionality that has been deployed in other contexts within other standards. H
23、owever, the IDSA in its present form is not known to have been deployed in any existing implementations. Use in other Standards: The XOR technique used in IDSA is used in conjunction with a similar block cipher used in the Advanced Television Systems Committee (ATSC) over-the-air scrambling standard
24、 6. Chipset Support: Although there are no currently commercially-available chipsets that implement the IDSA, most of the IDSA cryptographic elements probably exist in current silicon implementations. Software and Hardware Friendly: The IDSA has been designed to be efficiently implementable in both
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS08000062010IIFDEFAULTSCRAMBLINGALGORITHMIDSAIPTVINTEROPERABILITYSPECIFICATIONVERSION002PDF

链接地址:http://www.mydoc123.com/p-541345.html