CA security is protected by chip bundle

Label: CA CW

This article refers to the address: http://

The overall conversion of digital TV in China has reached nearly 50 million. With the rapid development of network technology, many people are worried about the security of CA. This concern is normal with the exposure of CA security risks. The security of CA needs to be analyzed from both economic and technical levels.

Economically speaking, cable digital TVs do not have a cracking value because of the low fees, so it seems that the CA used is very secure. Some people say that because of legal risks, the author does not fully agree with this view. Is the law in Europe and the United States strict enough? Is Japan still not cracked and shared? Unattractive programs and low fees make the cracks worthless. Some netizens said that China's digital TV does not need to be encrypted, even if it is safe to insert a piece of paper into the set-top box. Although it is somewhat exaggerated, it also reflects the fundamentals of China's digital cable TV without breaking the value. The following focuses on technical security.

As we all know, in the digital TV CA technology, the main function of the smart card is to protect the code in the smart card from leaking. Because each smart card has a unique ID number, the program and data inside will be bound to this ID number. Under normal circumstances, the program and data files in one smart card cannot be directly copied to another smart card. The unique ID number of each smart card and the user information bundled with it can ensure the security of user management. But all of these guarantees are under a precondition that smart cards are not cracked. When the smart card is cracked, the hacker bypasses the authentication and authorization process associated with the smart card ID number and directly uses the core algorithm key to solve the CW. At this time, the hacker will see any details in the smart card, because the algorithms and keys in the smart card can not be updated, any clever algorithm and security policy are ineffective. Assume that the algorithm and key of the smart card can be upgraded, but this upgrade process is completely exposed to the hacker. Due to the limited capacity of smart card memory, the extraction of these algorithms is still very easy for hackers. In addition, the communication between the set-top box and the smart card is ISO7816 low-speed communication, ensuring that all users can upgrade new algorithms and keys, including The code stream of these secret information should exist in the network for a long time, not to mention that some CA companies use mask smart cards in order to reduce costs, and such smart cards cannot be upgraded. Thus, after the smart card is cracked, this upgrade loses its meaning. Therefore, the security of CA depends on the anti-cracking of the smart card. As long as the smart card is cracked, it is equal to a CA being completely broken. A smart card is actually a chip, but the package is different. Therefore, the security of the CA is bundled with the hardware of the chip. The security of the smart card CA depends on the anti-hacking capability of the smart card chip. That is to say, the security of the CA is bound to the smart card chip and is independent of the set-top box. attack. CW encrypted transmission is not a security measure, and it basically has nothing to do with it. The security of the smart card CA also depends on the human secret of the development of the CA software personnel. It is parallel with the confidentiality of the smart card chip, forming two security links of the CA. As long as one of the links has a problem, the CA will be completely broken. . The current CW network sharing technology has bypassed the above-mentioned links, making the security of smart cards virtually ineffective.

The security of the fast-developing cardless CA technology is actually bundled with the chip, but it is not bundled with a smart card chip, but bundled with the main chip and FLASH and DRAM with ID number. The security of this cardless CA technology with multiple chips actually spreads the risk to several semiconductor manufacturers. The algorithm and key can be downloaded dynamically, meaning no solution to the algorithm and key cracking. The high security that CA manufacturers proclaim. The only way to crack this CA is to clone the set-top box, and the clone set-top box must cooperate with the main chip of the set-top box, FLASH, etc., and the manufacturers that produce these chips are some big companies. It is almost impossible for them to help piracy. Card CA is built on this hardware, and the possibility of being cloned and cloned is ruled out. In this case, the CA algorithm and key cannot be firmwareized like the smart card CA, and must be dynamically downloaded and replaced at any time. However, this technology has certain difficulties. At present, only the Shandong Taixin family can support this CA technology.

But the biggest problem facing the cardless CA technology is that the algorithm and the key are both in the FLASH of the code stream or the set-top box. If there is a fast enough cracking method, there is still a certain security risk. This hidden danger depends on the algorithm or the secret. The update speed of the key. The general algorithm cracks the time in a few months. If the update speed is fast enough, the cardless CA technology is still safe. Judging from the use of digital TV in the United States, the cardless CA has not been cracked, but the smart card CA has been cracked very badly. Of course, this is also because of the high cost of digital TV in the United States. As Marx said, when there is a 200% profit, the capitalist will despise the law, and 300% of the profits will let the capitalists trample on everything in the world. It is estimated that hackers will also abide by this law. The reason why CA is easy to be cracked, in addition to economic benefits, the main reason is that smart cards can be independent of the set-top box and contain all the secrets of CA. Therefore, hackers can only force a smart card to attack.

From this point of view, regardless of whether the smart card CA or cardless CA, its security depends on the binding with the chip. The more complex the chip hardware, the more difficult it is to crack, and the higher the security of the bundled CA. Since it is bundled with the chip, from a security point of view, bundling multiple chips is definitely more secure than bundling one chip. The bundled set-top box chip is definitely more secure than the bundled smart card chip.

From a general point of view, security can be bundled with the chip. CA must be a stand-alone software, even open, but it must be online. Otherwise, it will cause the software to be firmwareized. If the software is compromised, it will break the CA and the security level will be greatly reduced.

Fiber Optic Cabinet is designed for a cross connection between telecom feeder cable and customer cable. It is normally in a floor-standing or occasionally wall-mounted way to be placed over the street serving as one of the optical nodes in access network. Fiber optic cross connect cabinet is typically used in buildings to splice incoming Outside Plant (OSP) fiber optical cables into customer premises cables. In certain situations, the Telecommunication Cabinet is necessary to mount it on the exterior of a building or a telecommunication pole.
Fiber Distribution Cabinet needs to be easily accessible and manageable in size. The dimension could be customized by client. If necessary, the box can be locked to keep the splices secure.Foclink,a reliable supplier of fiber optic cabinet,is always beside u 7*24

Fiber Optic Cabinet

Fiber Optic Cabinet,Telecommunication Cabinet,Fiber Cross Connect Cabinet,Fiber Distribution Cabinet

Foclink Co., Ltd , http://www.scfiberpigtail.com

Posted on