SlideShare a Scribd company logo
1 of 14
Download to read offline
Basics of BISS scrambling




        http://krimo666.mylivepage.com/
Contents



•   Definition of scrambling
•   BISS modes
•   BISS mode 1
•   BISS mode E
•   Calculation of encrypted session word
•   Buried ID
•   Injected ID
•   Connection diagram
•   Rate adaptation
•   Back panel description
•   Operation




                    http://krimo666.mylivepage.com/
Scrambling



•   Scrambling is a way to transform transmitted data in
    order to allow reception only by parties that have a valid
    descrambling key.

•   An open standard has been defined to allow different
    manufactures to implement the same scrambling system.

•   BISS = Basic Interoperable Scrambling System




                     http://krimo666.mylivepage.com/
BISS modes



•   BISS mode 0 : unscrambled (clear)
•   BISS mode 1 : scrambled with session word (SW)
•   BISS mode E : scrambled with encrypted session word
                  (ESW)


•   The session word is the key that is used in the receiver
    (IRD) to descramble the transmitted data.

•   Remark that BISS-E uses the same scrambling algorithm
    as BISS mode 1 but that there is an additional encryption
    on the session word.




                     http://krimo666.mylivepage.com/
BISS mode 1



•   BISS mode 1 uses a 12 digit hexadecimal key as session
    word. The session word has to be announced to all
    parties that are allowed to descramble the received data.

•   Example : 123456ABCDEF

•   The session word can easily be compromised, there is no
    protection when communicating it to the receive site(s).




                     http://krimo666.mylivepage.com/
BISS mode E



•   BISS mode E : scrambled with encrypted session word
    (ESW)

•   This mode uses the ID (identifier) of the receiver(s) and
    a session word to calculate an encrypted session word
    (16 digits hex)

•   There are two possible IDs               - buried ID
                                             - injected ID

•   By encrypting the session word there is an additional
    protection on the session word. The ESW can be
    communicated using a non-secure channel since in order
    to descramble the received signal both the ID and the
    ESW need to be known.


                     http://krimo666.mylivepage.com/
Calculation of encrypted session word


   Define a SW                                        Get the ID


                    Calculate ESW


                    Exchange ESW


                 Enter ESW in IRD(s)

  To calculate the ESW the DES3 algorithm is used

                    http://krimo666.mylivepage.com/
Buried ID



•   Each receiver (IRD) holds a unique ID (cfr. serial
    number) that can be used to identify that specific
    receiver : this is called the buried ID.

•   If you want to do a transmission that is to be received by
    only one specific receiver, use the buried ID to calculate
    the encrypted session word.




                     http://krimo666.mylivepage.com/
Injected ID



•   An identifier can be entered (injected) in a receiver
    (IRD), this injected ID can be entered in a single or a
    group of IRDs.

•   This allows a BISS-E protected transmission to a group of
    IRDs.




                     http://krimo666.mylivepage.com/
Rate adaptation



•   MPEG null packets are stripped from the incoming
    transport stream. Then the scrambling algorithm is
    applied to the transport stream.

•   After that, MPEG null packets are multiplexed with the
    scrambled transport stream (stuffing) to arrive at the
    desired output rate.




                     http://krimo666.mylivepage.com/
Operation BISS mode 1



•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode 1 with clear session word, enter
    the 12 digit session word.
•   Communicate the session word to the receive site(s).




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with buried ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with buried ID, get the buried ID
    of the IRD and use this together with a session word to
    calculated the encrypted session word (using the DES3
    algorithm).
•   Communicate the ESW to the receive site.




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with injected ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with injected ID, get the injected
    ID of the IRD(s) and use this together with a session
    word to calculated the encrypted session word (using the
    DES3 algorithm).
•   Communicate the ESW to the receive site(s).




                     http://krimo666.mylivepage.com/
Summary



   •    BISS mode 1 => session word (SW)
   •    BISS mode E => encrypted session word (ESW)

         –   SW + injected or buried ID -> ESW


   •    Rate adaptation


  End

Plus de Livres Electronique :
Cinema,Presse,Cuisine
Litterature,Politique
Religion,SciencePhilosophie
Mecanique,Informatique

http://kitab.synthasite.com/
                                http://krimo666.mylivepage.com/

More Related Content

What's hot

Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeDhruv Sharma
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxeschuxuantinh
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostInfosec
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Mazin Alwaaly
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocolMousmi Pawar
 
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH CiphersChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH CiphersAdaLabs
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud InvestigationZeeshan Shahid
 
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1SalmenHAJJI1
 
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...National Chengchi University
 

What's hot (20)

Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
 
Des
DesDes
Des
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxes
 
Chacha ppt
Chacha pptChacha ppt
Chacha ppt
 
Security awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter mostSecurity awareness training - 4 topics that matter most
Security awareness training - 4 topics that matter most
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Kerberos protocol
Kerberos protocolKerberos protocol
Kerberos protocol
 
Internet security protocol
Internet security protocolInternet security protocol
Internet security protocol
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH CiphersChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud Investigation
 
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1
 
Ipsec
IpsecIpsec
Ipsec
 
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
Threshold-optimal DSAECDSA signatures and an application to Bitcoin wallet se...
 
ip security
ip securityip security
ip security
 

Viewers also liked

NORSAT_KU-BAND_DRO_2000_LNB
NORSAT_KU-BAND_DRO_2000_LNBNORSAT_KU-BAND_DRO_2000_LNB
NORSAT_KU-BAND_DRO_2000_LNBSarren820
 
Modem synchronization and control
Modem synchronization and controlModem synchronization and control
Modem synchronization and controlsirish2chandraa
 
Carmen chamorro la cuadricula
Carmen chamorro   la cuadriculaCarmen chamorro   la cuadricula
Carmen chamorro la cuadriculaobservatorio2015
 
Reflexion canales infantiles
Reflexion canales infantilesReflexion canales infantiles
Reflexion canales infantilesTatianAvila21
 
Tugas Saran dan Prasarana
Tugas Saran dan PrasaranaTugas Saran dan Prasarana
Tugas Saran dan Prasaranaduajuni
 
Tancredi
TancrediTancredi
Tancredieorsscc
 
Factores de la problemática de la salud del niño y adolescente
Factores de la problemática de la salud del niño y adolescenteFactores de la problemática de la salud del niño y adolescente
Factores de la problemática de la salud del niño y adolescenteMijael Fayum Casaico Paredes
 
Centro de gravedad juan romero wilder malacas
Centro de gravedad juan romero   wilder malacasCentro de gravedad juan romero   wilder malacas
Centro de gravedad juan romero wilder malacaswmalacas
 
Exploring Twitter's Finagle technology stack for microservices
Exploring Twitter's Finagle technology stack for microservicesExploring Twitter's Finagle technology stack for microservices
Exploring Twitter's Finagle technology stack for microservices💡 Tomasz Kogut
 
Javascript in urdu - Muhammad Danish Irshad
Javascript in urdu - Muhammad Danish IrshadJavascript in urdu - Muhammad Danish Irshad
Javascript in urdu - Muhammad Danish IrshadMuhammad Danish
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomAnthony Beal
 
Asia Pricing & Revenue Management Summit 2016
Asia Pricing & Revenue Management Summit 2016Asia Pricing & Revenue Management Summit 2016
Asia Pricing & Revenue Management Summit 2016Jesper Hansson
 
Tk tech-green-biblio-10-11
Tk tech-green-biblio-10-11Tk tech-green-biblio-10-11
Tk tech-green-biblio-10-11Tagit Klimor
 

Viewers also liked (20)

ECMG & EMMG protocol
ECMG & EMMG protocolECMG & EMMG protocol
ECMG & EMMG protocol
 
Venus
VenusVenus
Venus
 
NORSAT_KU-BAND_DRO_2000_LNB
NORSAT_KU-BAND_DRO_2000_LNBNORSAT_KU-BAND_DRO_2000_LNB
NORSAT_KU-BAND_DRO_2000_LNB
 
Modem synchronization and control
Modem synchronization and controlModem synchronization and control
Modem synchronization and control
 
Carmen chamorro la cuadricula
Carmen chamorro   la cuadriculaCarmen chamorro   la cuadricula
Carmen chamorro la cuadricula
 
Reflexion canales infantiles
Reflexion canales infantilesReflexion canales infantiles
Reflexion canales infantiles
 
NEO DESIGN PERU
NEO DESIGN PERU NEO DESIGN PERU
NEO DESIGN PERU
 
Tugas Saran dan Prasarana
Tugas Saran dan PrasaranaTugas Saran dan Prasarana
Tugas Saran dan Prasarana
 
Tancredi
TancrediTancredi
Tancredi
 
Kores catalogue 2010
Kores catalogue 2010Kores catalogue 2010
Kores catalogue 2010
 
Factores de la problemática de la salud del niño y adolescente
Factores de la problemática de la salud del niño y adolescenteFactores de la problemática de la salud del niño y adolescente
Factores de la problemática de la salud del niño y adolescente
 
Centro de gravedad juan romero wilder malacas
Centro de gravedad juan romero   wilder malacasCentro de gravedad juan romero   wilder malacas
Centro de gravedad juan romero wilder malacas
 
Exploring Twitter's Finagle technology stack for microservices
Exploring Twitter's Finagle technology stack for microservicesExploring Twitter's Finagle technology stack for microservices
Exploring Twitter's Finagle technology stack for microservices
 
Javascript in urdu - Muhammad Danish Irshad
Javascript in urdu - Muhammad Danish IrshadJavascript in urdu - Muhammad Danish Irshad
Javascript in urdu - Muhammad Danish Irshad
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroom
 
Referendum Estadal
Referendum EstadalReferendum Estadal
Referendum Estadal
 
Asia Pricing & Revenue Management Summit 2016
Asia Pricing & Revenue Management Summit 2016Asia Pricing & Revenue Management Summit 2016
Asia Pricing & Revenue Management Summit 2016
 
Mujer delincuente, víctima de la violencia en los altos de Jalisco (2005-2008...
Mujer delincuente, víctima de la violencia en los altos de Jalisco (2005-2008...Mujer delincuente, víctima de la violencia en los altos de Jalisco (2005-2008...
Mujer delincuente, víctima de la violencia en los altos de Jalisco (2005-2008...
 
Tk tech-green-biblio-10-11
Tk tech-green-biblio-10-11Tk tech-green-biblio-10-11
Tk tech-green-biblio-10-11
 
Windows phone un fuerte contendiente
Windows phone un fuerte contendienteWindows phone un fuerte contendiente
Windows phone un fuerte contendiente
 

Similar to Basic of BISS

Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Encryption pres
Encryption presEncryption pres
Encryption presMereySovet
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5FRSecure
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information EncryptionAmna Magzoub
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPunnya Babu
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDharani675311
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfSJDalore1
 

Similar to Basic of BISS (20)

Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Encryption pres
Encryption presEncryption pres
Encryption pres
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Pgp1
Pgp1Pgp1
Pgp1
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Secure communication
Secure communicationSecure communication
Secure communication
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 

More from aniruddh Tyagi

More from aniruddh Tyagi (20)

whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4
 
BUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTERBUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTER
 
digital_set_top_box2
digital_set_top_box2digital_set_top_box2
digital_set_top_box2
 
Discrete cosine transform
Discrete cosine transformDiscrete cosine transform
Discrete cosine transform
 
DCT
DCTDCT
DCT
 
EBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFFEBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFF
 
ADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMODADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMOD
 
DVB_Arch
DVB_ArchDVB_Arch
DVB_Arch
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
 
Classification
ClassificationClassification
Classification
 
tyagi 's doc
tyagi 's doctyagi 's doc
tyagi 's doc
 
quantization_PCM
quantization_PCMquantization_PCM
quantization_PCM
 
ECMG & EMMG protocol
ECMG & EMMG protocolECMG & EMMG protocol
ECMG & EMMG protocol
 
7015567A
7015567A7015567A
7015567A
 
Basic of BISS
Basic of BISSBasic of BISS
Basic of BISS
 
euler theorm
euler theormeuler theorm
euler theorm
 
fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1
 
quantization
quantizationquantization
quantization
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
DVBSimulcrypt2
DVBSimulcrypt2DVBSimulcrypt2
DVBSimulcrypt2
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Basic of BISS

  • 1. Basics of BISS scrambling http://krimo666.mylivepage.com/
  • 2. Contents • Definition of scrambling • BISS modes • BISS mode 1 • BISS mode E • Calculation of encrypted session word • Buried ID • Injected ID • Connection diagram • Rate adaptation • Back panel description • Operation http://krimo666.mylivepage.com/
  • 3. Scrambling • Scrambling is a way to transform transmitted data in order to allow reception only by parties that have a valid descrambling key. • An open standard has been defined to allow different manufactures to implement the same scrambling system. • BISS = Basic Interoperable Scrambling System http://krimo666.mylivepage.com/
  • 4. BISS modes • BISS mode 0 : unscrambled (clear) • BISS mode 1 : scrambled with session word (SW) • BISS mode E : scrambled with encrypted session word (ESW) • The session word is the key that is used in the receiver (IRD) to descramble the transmitted data. • Remark that BISS-E uses the same scrambling algorithm as BISS mode 1 but that there is an additional encryption on the session word. http://krimo666.mylivepage.com/
  • 5. BISS mode 1 • BISS mode 1 uses a 12 digit hexadecimal key as session word. The session word has to be announced to all parties that are allowed to descramble the received data. • Example : 123456ABCDEF • The session word can easily be compromised, there is no protection when communicating it to the receive site(s). http://krimo666.mylivepage.com/
  • 6. BISS mode E • BISS mode E : scrambled with encrypted session word (ESW) • This mode uses the ID (identifier) of the receiver(s) and a session word to calculate an encrypted session word (16 digits hex) • There are two possible IDs - buried ID - injected ID • By encrypting the session word there is an additional protection on the session word. The ESW can be communicated using a non-secure channel since in order to descramble the received signal both the ID and the ESW need to be known. http://krimo666.mylivepage.com/
  • 7. Calculation of encrypted session word Define a SW Get the ID Calculate ESW Exchange ESW Enter ESW in IRD(s) To calculate the ESW the DES3 algorithm is used http://krimo666.mylivepage.com/
  • 8. Buried ID • Each receiver (IRD) holds a unique ID (cfr. serial number) that can be used to identify that specific receiver : this is called the buried ID. • If you want to do a transmission that is to be received by only one specific receiver, use the buried ID to calculate the encrypted session word. http://krimo666.mylivepage.com/
  • 9. Injected ID • An identifier can be entered (injected) in a receiver (IRD), this injected ID can be entered in a single or a group of IRDs. • This allows a BISS-E protected transmission to a group of IRDs. http://krimo666.mylivepage.com/
  • 10. Rate adaptation • MPEG null packets are stripped from the incoming transport stream. Then the scrambling algorithm is applied to the transport stream. • After that, MPEG null packets are multiplexed with the scrambled transport stream (stuffing) to arrive at the desired output rate. http://krimo666.mylivepage.com/
  • 11. Operation BISS mode 1 • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode 1 with clear session word, enter the 12 digit session word. • Communicate the session word to the receive site(s). http://krimo666.mylivepage.com/
  • 12. Operation BISS mode E with buried ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with buried ID, get the buried ID of the IRD and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site. http://krimo666.mylivepage.com/
  • 13. Operation BISS mode E with injected ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with injected ID, get the injected ID of the IRD(s) and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site(s). http://krimo666.mylivepage.com/
  • 14. Summary • BISS mode 1 => session word (SW) • BISS mode E => encrypted session word (ESW) – SW + injected or buried ID -> ESW • Rate adaptation End Plus de Livres Electronique : Cinema,Presse,Cuisine Litterature,Politique Religion,SciencePhilosophie Mecanique,Informatique http://kitab.synthasite.com/ http://krimo666.mylivepage.com/