Skip to main content

Improving the Host Authentication Mechanism for POD Copy Protection System

  • Chapter
New Directions in Intelligent Interactive Multimedia

Part of the book series: Studies in Computational Intelligence ((SCI,volume 142))

  • 916 Accesses

Abstract

In 2004, SCTE has approved the POD (point-of-deployment) copy protection system as an ANSI standard. In the POD copy protection system, before the POD module removes the scrambling, this module first authenticates a host device to confirm its legitimization. The confirmation procedure is known as a “host authentication mechanism”. However, in 2005, Tian et al. showed that the host authentication mechanism in the current POD copy protection system has the following three weaknesses: (1) The re-authentication procedure cannot stand out a simple replay attack. (2) The host authentication protocol can make a DH (Diffie-Hellman) private key in any run as significant as a device private key. (3) The credentials of the POD module are futile. This paper proposes an improved secure host authentication mechanism for the current POD copy protection system that not only withstands the above three weaknesses but also provides same efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ANSI/SCTE, POD Copy Protection System. Society of Cable Telecommunications Engineers, 2004, ANSI/SCTE 41 (2004)

    Google Scholar 

  2. ANSI/SCTE, POD Copy Protection System. Society of Cable Telecommunications Engineers, 2001, ANSI/SCTE 41 (2001)

    Google Scholar 

  3. Zhang, C.N., Li, H., Zhang, N.N., Xie, J.S.: A DSP Based POD Implementation for High Speed Multimedia Communications. EURASIP Journal on Applied Signal Processing 2002(9), 975–980 (2002)

    Article  MATH  Google Scholar 

  4. Kim, W.H., Song, W.J., Kim, B.G., Ahn, B.H.: Design and Development of a new POD security module chip-set based on the OpenCable specification. IEEE Trans. on Consumer Electron. 48(3), 770–775 (2002)

    Article  Google Scholar 

  5. Traw, C.B.S.: Protecting Digital Content within the home. Compter 34(10), 42–47 (2001)

    Article  Google Scholar 

  6. Eskicioglu, A.M., Delp, E.J.: An overview of multimedia content protection in consumer electronics devices. Elsevier Signal Processing: Image Communication 16, 681–699 (2001)

    Article  Google Scholar 

  7. Tian, H.-B., Zhan, Y., Wang, Y.-M.: Analysis of Host Authentication Mechanism in Current POD Copy Protection System. IEEE Transactions on Consumer Electronics 51(3) (August 2005)

    Google Scholar 

  8. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptograph. CRC Press, New York (1997)

    Google Scholar 

  9. ISO/IEC, Information Technology-Security Techniques - Entity Authentication Mechanisms - Part 2: Entity authentication using symmetric techniques, International Organization for Standardization and International Electro-technical Commission, ISO/IEC JTC 1/SC 27 N739 DIS 9798-2, 1993-08-13 (1993)

    Google Scholar 

  10. Mao, W.B.: Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

George A. Tsihrintzis Maria Virvou Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yoon, EJ., Yoo, KY. (2008). Improving the Host Authentication Mechanism for POD Copy Protection System. In: Tsihrintzis, G.A., Virvou, M., Howlett, R.J., Jain, L.C. (eds) New Directions in Intelligent Interactive Multimedia. Studies in Computational Intelligence, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68127-4_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68127-4_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68126-7

  • Online ISBN: 978-3-540-68127-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics