1996-03-31 - Re: [NOISE] Cable-TV-Piracy-Punks

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: mpd@netcom.com (Mike Duvos)
Message Hash: a8bde396dada9a997c6163e3ecaeb471f618c0aa904f3d284c32495cb953d074
Message ID: <199603310021.TAA17420@jekyll.piermont.com>
Reply To: <199603302351.PAA03993@netcom14.netcom.com>
UTC Datetime: 1996-03-31 06:40:49 UTC
Raw Date: Sun, 31 Mar 1996 14:40:49 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Sun, 31 Mar 1996 14:40:49 +0800
To: mpd@netcom.com (Mike Duvos)
Subject: Re: [NOISE] Cable-TV-Piracy-Punks
In-Reply-To: <199603302351.PAA03993@netcom14.netcom.com>
Message-ID: <199603310021.TAA17420@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Mike Duvos writes:
> In the system I described, a person might make a lower bandwidth
> attempt to defeat the system by leaking either the periodically
> changing random session key used to encrypt the video stream, or
> the unique cryptographic key belonging to a particular smart card
> authorized to view the program.  We have postulated that the
> latter is not recoverable even by destructive reverse engineering
> of a specific card,

Why not? If the card knows its own key, then someone else can probably
get the key out by some nasty mechanism.

.pm





Thread