On the security of an novel protocol for downloadable CAS

Hanjae Jeong, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.

Original languageEnglish
Title of host publicationProceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
DOIs
Publication statusPublished - 2012 May 8
Event6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 - Kuala Lumpur, Malaysia
Duration: 2012 Feb 202012 Feb 22

Other

Other6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
CountryMalaysia
CityKuala Lumpur
Period12/2/2012/2/22

Fingerprint

Authentication
Defects

Keywords

  • Conditional access
  • DCAS protocol
  • Downloadable CAS
  • Impersonation attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Jeong, H., Kim, S-J., & Won, D. (2012). On the security of an novel protocol for downloadable CAS. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 [65] https://doi.org/10.1145/2184751.2184831

On the security of an novel protocol for downloadable CAS. / Jeong, Hanjae; Kim, Seung-Joo; Won, Dongho.

Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012. 65.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jeong, H, Kim, S-J & Won, D 2012, On the security of an novel protocol for downloadable CAS. in Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12., 65, 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12, Kuala Lumpur, Malaysia, 12/2/20. https://doi.org/10.1145/2184751.2184831
Jeong H, Kim S-J, Won D. On the security of an novel protocol for downloadable CAS. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012. 65 https://doi.org/10.1145/2184751.2184831
Jeong, Hanjae ; Kim, Seung-Joo ; Won, Dongho. / On the security of an novel protocol for downloadable CAS. Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012.
@inproceedings{90a590f50d954bc1ae532b0ce71945ad,
title = "On the security of an novel protocol for downloadable CAS",
abstract = "In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.",
keywords = "Conditional access, DCAS protocol, Downloadable CAS, Impersonation attack",
author = "Hanjae Jeong and Seung-Joo Kim and Dongho Won",
year = "2012",
month = "5",
day = "8",
doi = "10.1145/2184751.2184831",
language = "English",
isbn = "9781450311724",
booktitle = "Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12",

}

TY - GEN

T1 - On the security of an novel protocol for downloadable CAS

AU - Jeong, Hanjae

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2012/5/8

Y1 - 2012/5/8

N2 - In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.

AB - In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs.

KW - Conditional access

KW - DCAS protocol

KW - Downloadable CAS

KW - Impersonation attack

UR - http://www.scopus.com/inward/record.url?scp=84860514505&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84860514505&partnerID=8YFLogxK

U2 - 10.1145/2184751.2184831

DO - 10.1145/2184751.2184831

M3 - Conference contribution

AN - SCOPUS:84860514505

SN - 9781450311724

BT - Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

ER -