z-logo
open-access-imgOpen Access
Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices
Author(s) -
Koo HanSeung,
Kwon OHyung,
Lee Soo In
Publication year - 2010
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.10.1409.0077
Subject(s) - forward secrecy , secrecy , key (lock) , computer security , key management , computer science , protocol (science) , host (biology) , security association , computer network , key agreement protocol , cryptographic protocol , pairing , public key cryptography , key distribution , cryptography , security information and event management , cloud computing security , encryption , physics , medicine , ecology , cloud computing , alternative medicine , pathology , biology , operating system , superconductivity , quantum mechanics
In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key‐share, and key control.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here