Audio/Video compression Security Alain Bouffioux December, 20, 2006.

Slides:



Advertisements
Similar presentations
By Md Emran Mazumder Ottawa University Student no:
Advertisements

Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Encryption Methods By: Michael A. Scott
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
MT311 Java Application Development and Programming Languages Li Tak Sing ( 李德成 )
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Problems with symmetric (private-key) encryption 1) secure distribution of keys 2) large number of keys Solution to both problems: Public-key (asymmetric)
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
I-4 security.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Encryption.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Some Perspectives on Smart Card Cryptography
Network Security David Lazăr.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Presentation transcript:

Audio/Video compression Security Alain Bouffioux December, 20, 2006

AV Compression / Alain Bouffioux 2 Agenda What is cryptography Symmetric & public-key cryptography Why cryptography for DVB ? Conditional access information in MPEG/DVB Conditional access mechanism Conditional access interfaces

December, 20, 2006 AV Compression / Alain Bouffioux 3 Why cryptography ? –CONFIDENTIALITY - The message is not listened –INTEGRITY - The message is not modified –AUTHENTICITY - The message has been sent by Alice –NON-REPUDIATION - Alice cannot falsely deny she has sent the message What is cryptography (1/2)

December, 20, 2006 AV Compression / Alain Bouffioux 4 What is cryptography (2/2) Basic terminology

December, 20, 2006 AV Compression / Alain Bouffioux 5 Symmetric cryptography Public-key cryptography Key1 = Key2Key 1  Key 2 Public-key cryptography One Public-key (known by everybody) : PK One Private-key or Secret-key (kept secret) : SK C = E Key1 (M)  M = D Key2 (C) = D Key2 (E Key1 (M)) In public-key cryptography, key1 may be PK or SK and key2 is the other key. Symmetric & public-key cryptography(1)

December, 20, 2006 AV Compression / Alain Bouffioux 6 Symmetric & public-key cryptography(2) Example of symmetric cryptography –Key stream as long as message –Key stream = pseudo-random sequence (easy to break) –Low security should be compensated by frequent change of keys  necessity of secure channel  2 channels : one for the message & one for the key

December, 20, 2006 AV Compression / Alain Bouffioux 7 Symmetric & public-key cryptography(3) Example of public-key cryptography

December, 20, 2006 AV Compression / Alain Bouffioux 8 Symmetric & public-key cryptography(4) Symmetric cryptography example : DES Public-key cryptography example : RSA (1977) Symmetric versus public-key cryptography –Symmetric cryptography is faster (about 1000 times). –Low security of symmetric cryptography (due to the necessity of key transport) is improved by a frequent change of the key. –In Public-key cryptography the secret-key may be kept secret. It is never transported  High security. –Different usage : In DVB, symmetric key algorithm for encrypting data, public-key algorithm for key management (secure channel). Hybrid cryptosystem Example : DES for message and RSA for key encryption

December, 20, 2006 AV Compression / Alain Bouffioux 9 Cryptography and DVB (1/2) Cryptography may prevent unauthorised receiver from decoding the program. DVB compared with banking or military secret –high information rate –low information value –decryption must be cheap Cost of cracking the system should be higher than the benefits gained from the cracking Cryptography in DVB is a trade-off between cost/complexity versus piracy-proof. CA (Conditional Access) = very sensitive subject. Some service providers want their own CA system.

December, 20, 2006 AV Compression / Alain Bouffioux 10 Cryptography and DVB (2/2) MPEG does not specify a conditional access (CA) system but defines a frame to support CA. DVB characterises some aspect left undefined by MPEG, It defines a CA interface. The broadcaster develops its CA system using a CA interface. DVB is based on –symmetric cryptography for audio-visual transmission –frequent key change to increase security –Public-key cryptography for key-exchange DVB relies on –stream of ECM’s (Entitlement Control Message) –stream of EMM’s (Entitlement Management Message)

December, 20, 2006 AV Compression / Alain Bouffioux 11 CA information in MPEG TS (1/2)

December, 20, 2006 AV Compression / Alain Bouffioux 12 CA information in MPEG TS (2/2)

December, 20, 2006 AV Compression / Alain Bouffioux 13 The CA mechanism : illustration Decryption Encrypted AV dataClear AV Data SMARTCARD Decryption ECM’s (Program related) EMM’s (CA system related) IK Entitlement SK Access control parameters SK CW’s PDK1PDK2 PDK

December, 20, 2006 AV Compression / Alain Bouffioux 14 The CA mechanism (1/2) AV streams are scrambled with Control Words (CW) using symmetric cryptography CW are encrypted using Service Keys (SK), are placed in ECM’s and are securely transmitted to the receiver

December, 20, 2006 AV Compression / Alain Bouffioux 15 The CA mechanism (2/2) SK are encrypted using public-key cryptography - Keys are IK (unique key internal to the smartcard) or PDK (transmitted via EMM’s in order to define user’s group) ECM’s carries (informations related to a single program  PID of ECM’s in PMT) –enciphered CW –access parameters ECM’s are decoded to CW if the receiver contains the required entitlements EMM’s carries (information related to a conditional access system  PID of EMM’s in CAT) –New entitlements, SK’s (Service Keys) –Programmer distribution key

December, 20, 2006 AV Compression / Alain Bouffioux 16 About DVB scrambling Encryption occurs after compression (at the location in the stream where the redundancy is at its lowest value) in order to have a robust encryption system. Encryption may occur at PES level or at TS level. DVB scrambling is transparent (a valid TS remains valid after scrambling)  facilitates transport and manipulation. Synchronisation based on PCR’s  constant time required for scrambling/descrambling. Security device should authenticate EMM’s origin. CA is only one aspects of cryptography usage in DVB. An other may be copy protection by (watermarking) and authentication (by signature).

December, 20, 2006 AV Compression / Alain Bouffioux 17