DOI QR코드

DOI QR Code

Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System

칩셋 페어링 접근제한시스템 환경에서 다중 셋톱박스를 지원하는 키 분배 기법

  • Received : 2011.09.05
  • Accepted : 2011.11.08
  • Published : 2012.02.29

Abstract

In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.

본 논문에서는 유연한 칩셋 페어링 접근제한시스템을 위한 새로운 키 분배 기법을 제안하였다. 칩셋 페어링 접근제한시스템은 셋톱박스에 내장된 보안 칩과 스마트카드를 함께 사용해 CA(Conditional Access) 모듈을 구현한 것으로, 셋톱박스에 내장된 보안 칩은 스마트카드와 셋톱박스 사이에 보안 채널을 형성한다. 즉, 스마트카드는 암호화된 제어단어를 셋톱박스로 출력하고, 셋톱박스는 내장된 보안 칩을 이용해 암호화된 제어단어를 복호화하는 시스템이다. 이 방식은 셋톱박스와 스마트카드를 바인딩 하는 방식으로 하나의 스마트카드는 정해진 하나의 셋톱박스에서만 사용이 가능하다는 단점을 가진다. 제안하는 키 분배 기법은 중국인의 나머지 정리를 이용하여 기존의 칩셋 페어링 접근제한시스템이 가지는 문제를 해결하였다. 우리의 키 분배 기법은 하나의 스마트카드를 다수의 셋톱박스에서 사용하는 것이 가능하며, 큰 변경 없이 현재의 칩셋 페어링 접근제한시스템에 적용이 가능하다는 장점을 가진다.

Keywords

References

  1. EBU Project Group B/CA, "Functional model of a conditional access system", EBU Technical Review, pp.64-77, 1995.
  2. W. Kanjanarin and T. Amornraksa, "Scrambling and key distribution scheme for digital television", IEEE International Conference on Networks (ICN), pp.140-145, 2001.
  3. T. Jiang, Y. Hou and S. Zheng, "Secure communication between set-top box and smart card in DTV broadcasting", IEEE Transaction on Consumer Electronics, Vol.50, No.3, pp.882-886, 2004. https://doi.org/10.1109/TCE.2004.1341695
  4. T. Hou, J. Lai and C. Yeh, "Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting", TENCON 2007, IEEE Region 10 Conference, pp.1-5, 2007.
  5. H. Kim, "Secure communication in digital TV broadcasting", International Journal of Computer Science and Network Security (IJCSNS), Vol.8, No.9, pp.1-5, 2008.
  6. E. Yoon and K. Yoo, "Robust key exchange protocol between set-top box and smart card in DTV broadcasting", INFORMATICA, Vol.20, No.1, pp.139-150, 2009.
  7. S. Lee, N. Park, S. Kim and J. Choi, "Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting", International Conference on Information Security and Assurance (ISA), LNCS 5576, pp.797-803, 2009.
  8. T. Comen, C. Leiserson, R. Rivest and C. Stein, "Introduction to algorithms," Second Edition. MIT Press and Mcgraw-Hill, 2001. ISBN 09262-03293-7.
  9. G. Chiou and W. Chen, "Secure broadcasting using the secure lock," IEEE Transaction on Software Engineering, Vol.15, No.8, pp.929-934, 1989 https://doi.org/10.1109/32.31350
  10. B. Hu, W. Ye, S. Feng and X. Wang, "Key distribution scheme based on two cryptosystems for hierarchical access control," IEEE International Conference on Advanced Communication Technology (ICACT), pp.1723-1728, 2006.
  11. X. Zheng, C. Huang and M. Matthews, "Chinese remainder theorem based group key management," ACM Southeast Regional Conference, pp.206-271, 2007.
  12. J. Zhou and Y. Ou, "Key tree and Chinese remainder theorem based group key distribution scheme," Journal of Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers, Series A/Chungk-kuoKung Ch'eng Hsuck K'an Vol.32, Issue7, pp.967-974, 2009.
  13. Y. Ren, V. Oleshchuk and F. Li, "An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs," IEEE International Conference on Information Theory and Information Security (ICITIS), pp.689-692, 2010.
  14. Y. Song and Y. Zhang, "A mixed key management scheme of clustering wireless sensor network," International Conference on Computer Application and System Modeling (ICCASM), pp.v7198-v7201, 2010.