TY - GEN
T1 - On the security of an novel protocol for downloadable CAS
AU - Jeong, Hanjae
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2012
Y1 - 2012
N2 - In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.
AB - In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.
KW - Conditional access
KW - DCAS protocol
KW - Downloadable CAS
KW - Impersonation attack
UR - http://www.scopus.com/inward/record.url?scp=84860514505&partnerID=8YFLogxK
U2 - 10.1145/2184751.2184831
DO - 10.1145/2184751.2184831
M3 - Conference contribution
AN - SCOPUS:84860514505
SN - 9781450311724
T3 - Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
BT - Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
T2 - 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
Y2 - 20 February 2012 through 22 February 2012
ER -