Video Casting Application Oriented Key Exchange
Abstract
Within video stateless receivers, a central server should deliver information securely to the authorized users, over a public channel, even if receivers do not update their state from session to session. This is the case of a multimedia conditional access systems based on one way broadcasting. This paper suggests a new approach to assure a secure communication in such environments. The proposed approach is an efficient key exchange scheme for stateless receivers. It reduces the number of private keys used in traditional conditional access systems and the number of encryptions operations as it does not need to encrypt the ciphering keys. Furthermore, the presented approach eliminates the required key refreshment presented in other approaches. We tested the proposed system using AES algorithm. A numerical example is used to demonstrate the effectiveness of the presented approach. This technique can be very useful for small devices, with limited resources and strict power consumption r...
References (15)
- A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, and J. Quisquater (2008), "Overview on Selective Encryption of Image and Video: Challenges and Perspectives", EURASIP Journal on Information Security, Vol. 2008, (January 2008), Article 5.
- A. Rashed (2007), "Using Modified Genetic Algorithm to Replace AES Key Expansion Algorithms", The International Conference on Information Technology (ICIT'2007) at Al-Zaytoonah University, Jordan on May 9-11, 2007. WWW.alzaytoonah.edu.jo/icit2007
- A. Rashed and N. Ajlouni (2004), "An Extended Rijndael Block Cipher Using Java", the 2004 International Conference on software Engineering Research and practice, Las Vigas, Nevada USA, June 2004, pp. 21-24.
- B. Kirkels, M. Maas, and P. Roelse (2007), "A Security Architecture for Pay-Per-View Business Models in Conditional Access Systems", ACM Workshop On Digital Rights Management, Proceedings of the 2007 ACM workshop on Digital Rights Management: Alexandria, Virginia, USA:1-9.
- C. Eagle, Z. Gao, M. Omar, D. Panario, and B. Richmond (2008), "Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers", Fifth Colloquium and Computer Science, DMTCS proc. AI: pp. 195-206.
- D. Dardari, M. Martini., M. Mazzott, and M. Chiani (2004), "Layered Video Transmission on Adaptive OFDM Wireless Systems", EURASIP Journal on Applied Signal Processing, Volume 2004: pp. 1557 -1567
- D. Naor, M. Naor, and J. Lotspeich (2001), "Revoking and Tracing Scheme of Stateless Receiver", Proceedings of Crypto01, LNCS 2139, pp. 29-30.
- H. Koo, O. Kwon, and J. Kim (2005), "Key Refreshment Management for Conditional Access System in DTV Broadcasting", International Conference consumer Electronics, Jan 2005 : pp. 29-30
- H. Shirazi, J. Cosmas, D. Cutts, N. Birch, and P. Daly (2008), "Security Architectures in Mobile Integrated Pay-TV Conditional Access System", Networks 2008 -13th International Telecommunications Network Strategy and Planning Symposium 1.
- M. Abdalla, Y. Shavitt, and A. Wool (2000), "Key Management for Restricted Multicast Using Broadcast Encryption", IEEE/ACM Transactions on Networking (TON), Vol. 8 , Issue 4: pp. 443 - 454
- N. Ajlouni, A. El-Sheikh, and A. Rashed (2006), "New Approach in Key Generation and Expansion in Rijndael Algorithm", International Arab Journal of Information Technology, vol. 3, no.
- T. Asano (2002), "A Revocation Scheme with Minimal Storage at Receivers", ASIACRYPT'02, LNCS V.2501: pp. 433-450.
- Y. Hwang, H. Chong, and J. Pil (2004), "An Efficient Revocation Scheme for Stateless Receivers", EuroPKI 2004, LNCS 3093, Springer-Verlag Berlin Heidelberg: pp. 322-334.
- Y. Zhang, C. Yang, J. Liu, and J. Tian (2009), "Broadcast Encryption Scheme and Its Implementation on Conditional Access System", Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA'09) Nanchang, P. R. China, May 22-24, 2009: pp. 379-382
- Y. Zhang, C. Yangt, J. Liu, and J. Li (2007), "A Novel Broadcast Encryption Scheme Based on SD Scheme Reconstruction", Communications and Networking in China, 2007. CHINACOM '07, Second International Conference on Digital Object Identifier: 10.1109/CHINACOM.2007.4469408, pp.: 387 -391.