SlideShare a Scribd company logo
1 of 14
Download to read offline
Basics of BISS scrambling




        http://krimo666.mylivepage.com/
Contents



•   Definition of scrambling
•   BISS modes
•   BISS mode 1
•   BISS mode E
•   Calculation of encrypted session word
•   Buried ID
•   Injected ID
•   Connection diagram
•   Rate adaptation
•   Back panel description
•   Operation




                    http://krimo666.mylivepage.com/
Scrambling



•   Scrambling is a way to transform transmitted data in
    order to allow reception only by parties that have a valid
    descrambling key.

•   An open standard has been defined to allow different
    manufactures to implement the same scrambling system.

•   BISS = Basic Interoperable Scrambling System




                     http://krimo666.mylivepage.com/
BISS modes



•   BISS mode 0 : unscrambled (clear)
•   BISS mode 1 : scrambled with session word (SW)
•   BISS mode E : scrambled with encrypted session word
                  (ESW)


•   The session word is the key that is used in the receiver
    (IRD) to descramble the transmitted data.

•   Remark that BISS-E uses the same scrambling algorithm
    as BISS mode 1 but that there is an additional encryption
    on the session word.




                     http://krimo666.mylivepage.com/
BISS mode 1



•   BISS mode 1 uses a 12 digit hexadecimal key as session
    word. The session word has to be announced to all
    parties that are allowed to descramble the received data.

•   Example : 123456ABCDEF

•   The session word can easily be compromised, there is no
    protection when communicating it to the receive site(s).




                     http://krimo666.mylivepage.com/
BISS mode E



•   BISS mode E : scrambled with encrypted session word
    (ESW)

•   This mode uses the ID (identifier) of the receiver(s) and
    a session word to calculate an encrypted session word
    (16 digits hex)

•   There are two possible IDs               - buried ID
                                             - injected ID

•   By encrypting the session word there is an additional
    protection on the session word. The ESW can be
    communicated using a non-secure channel since in order
    to descramble the received signal both the ID and the
    ESW need to be known.


                     http://krimo666.mylivepage.com/
Calculation of encrypted session word


   Define a SW                                        Get the ID


                    Calculate ESW


                    Exchange ESW


                 Enter ESW in IRD(s)

  To calculate the ESW the DES3 algorithm is used

                    http://krimo666.mylivepage.com/
Buried ID



•   Each receiver (IRD) holds a unique ID (cfr. serial
    number) that can be used to identify that specific
    receiver : this is called the buried ID.

•   If you want to do a transmission that is to be received by
    only one specific receiver, use the buried ID to calculate
    the encrypted session word.




                     http://krimo666.mylivepage.com/
Injected ID



•   An identifier can be entered (injected) in a receiver
    (IRD), this injected ID can be entered in a single or a
    group of IRDs.

•   This allows a BISS-E protected transmission to a group of
    IRDs.




                     http://krimo666.mylivepage.com/
Rate adaptation



•   MPEG null packets are stripped from the incoming
    transport stream. Then the scrambling algorithm is
    applied to the transport stream.

•   After that, MPEG null packets are multiplexed with the
    scrambled transport stream (stuffing) to arrive at the
    desired output rate.




                     http://krimo666.mylivepage.com/
Operation BISS mode 1



•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode 1 with clear session word, enter
    the 12 digit session word.
•   Communicate the session word to the receive site(s).




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with buried ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with buried ID, get the buried ID
    of the IRD and use this together with a session word to
    calculated the encrypted session word (using the DES3
    algorithm).
•   Communicate the ESW to the receive site.




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with injected ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with injected ID, get the injected
    ID of the IRD(s) and use this together with a session
    word to calculated the encrypted session word (using the
    DES3 algorithm).
•   Communicate the ESW to the receive site(s).




                     http://krimo666.mylivepage.com/
Summary



   •    BISS mode 1 => session word (SW)
   •    BISS mode E => encrypted session word (ESW)

         –   SW + injected or buried ID -> ESW


   •    Rate adaptation


  End

Plus de Livres Electronique :
Cinema,Presse,Cuisine
Litterature,Politique
Religion,SciencePhilosophie
Mecanique,Informatique

http://kitab.synthasite.com/
                                http://krimo666.mylivepage.com/

More Related Content

Viewers also liked

haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transformaniruddh Tyagi
 
BUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTERBUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTERaniruddh Tyagi
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomonaniruddh Tyagi
 
ADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMODADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMODaniruddh Tyagi
 
whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4aniruddh Tyagi
 
EBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFFEBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFFaniruddh Tyagi
 
fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1aniruddh Tyagi
 
ATI Courses Satellite Communications Systems Engineering Professional Develop...
ATI Courses Satellite Communications Systems Engineering Professional Develop...ATI Courses Satellite Communications Systems Engineering Professional Develop...
ATI Courses Satellite Communications Systems Engineering Professional Develop...Jim Jenkins
 

Viewers also liked (13)

haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
 
quantization_PCM
quantization_PCMquantization_PCM
quantization_PCM
 
BUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTERBUC BLOCK UP CONVERTER
BUC BLOCK UP CONVERTER
 
art_sklar7_reed-solomon
art_sklar7_reed-solomonart_sklar7_reed-solomon
art_sklar7_reed-solomon
 
DCT
DCTDCT
DCT
 
DVBSimulcrypt2
DVBSimulcrypt2DVBSimulcrypt2
DVBSimulcrypt2
 
DVB_Arch
DVB_ArchDVB_Arch
DVB_Arch
 
ADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMODADVANCED DVB-C,DVB-S STB DEMOD
ADVANCED DVB-C,DVB-S STB DEMOD
 
whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4whitepaper_mpeg-if_understanding_mpeg4
whitepaper_mpeg-if_understanding_mpeg4
 
EBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFFEBU_DVB_S2 READY TO LIFT OFF
EBU_DVB_S2 READY TO LIFT OFF
 
DVB_Arch
DVB_ArchDVB_Arch
DVB_Arch
 
fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1
 
ATI Courses Satellite Communications Systems Engineering Professional Develop...
ATI Courses Satellite Communications Systems Engineering Professional Develop...ATI Courses Satellite Communications Systems Engineering Professional Develop...
ATI Courses Satellite Communications Systems Engineering Professional Develop...
 

Similar to Basic of BISS

Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Encryption pres
Encryption presEncryption pres
Encryption presMereySovet
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5FRSecure
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information EncryptionAmna Magzoub
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyPunnya Babu
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDharani675311
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfSJDalore1
 

Similar to Basic of BISS (20)

Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Encryption pres
Encryption presEncryption pres
Encryption pres
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Pgp1
Pgp1Pgp1
Pgp1
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Secure communication
Secure communicationSecure communication
Secure communication
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 

More from aniruddh Tyagi

More from aniruddh Tyagi (14)

7015567A
7015567A7015567A
7015567A
 
euler theorm
euler theormeuler theorm
euler theorm
 
fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1fundamentals_satellite_communication_part_1
fundamentals_satellite_communication_part_1
 
quantization
quantizationquantization
quantization
 
en_302769v010101v
en_302769v010101ven_302769v010101v
en_302769v010101v
 
Euler formula
Euler formulaEuler formula
Euler formula
 
IntrRSCode
IntrRSCodeIntrRSCode
IntrRSCode
 
video compression
video compressionvideo compression
video compression
 
fundamentals of linux
fundamentals of linuxfundamentals of linux
fundamentals of linux
 
IBCBarconetTransratingEfficiency
IBCBarconetTransratingEfficiencyIBCBarconetTransratingEfficiency
IBCBarconetTransratingEfficiency
 
beginner.en.print
beginner.en.printbeginner.en.print
beginner.en.print
 
rs-232
rs-232rs-232
rs-232
 
digital_set_top_box
digital_set_top_boxdigital_set_top_box
digital_set_top_box
 
ts_102427v010101p
ts_102427v010101pts_102427v010101p
ts_102427v010101p
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Basic of BISS

  • 1. Basics of BISS scrambling http://krimo666.mylivepage.com/
  • 2. Contents • Definition of scrambling • BISS modes • BISS mode 1 • BISS mode E • Calculation of encrypted session word • Buried ID • Injected ID • Connection diagram • Rate adaptation • Back panel description • Operation http://krimo666.mylivepage.com/
  • 3. Scrambling • Scrambling is a way to transform transmitted data in order to allow reception only by parties that have a valid descrambling key. • An open standard has been defined to allow different manufactures to implement the same scrambling system. • BISS = Basic Interoperable Scrambling System http://krimo666.mylivepage.com/
  • 4. BISS modes • BISS mode 0 : unscrambled (clear) • BISS mode 1 : scrambled with session word (SW) • BISS mode E : scrambled with encrypted session word (ESW) • The session word is the key that is used in the receiver (IRD) to descramble the transmitted data. • Remark that BISS-E uses the same scrambling algorithm as BISS mode 1 but that there is an additional encryption on the session word. http://krimo666.mylivepage.com/
  • 5. BISS mode 1 • BISS mode 1 uses a 12 digit hexadecimal key as session word. The session word has to be announced to all parties that are allowed to descramble the received data. • Example : 123456ABCDEF • The session word can easily be compromised, there is no protection when communicating it to the receive site(s). http://krimo666.mylivepage.com/
  • 6. BISS mode E • BISS mode E : scrambled with encrypted session word (ESW) • This mode uses the ID (identifier) of the receiver(s) and a session word to calculate an encrypted session word (16 digits hex) • There are two possible IDs - buried ID - injected ID • By encrypting the session word there is an additional protection on the session word. The ESW can be communicated using a non-secure channel since in order to descramble the received signal both the ID and the ESW need to be known. http://krimo666.mylivepage.com/
  • 7. Calculation of encrypted session word Define a SW Get the ID Calculate ESW Exchange ESW Enter ESW in IRD(s) To calculate the ESW the DES3 algorithm is used http://krimo666.mylivepage.com/
  • 8. Buried ID • Each receiver (IRD) holds a unique ID (cfr. serial number) that can be used to identify that specific receiver : this is called the buried ID. • If you want to do a transmission that is to be received by only one specific receiver, use the buried ID to calculate the encrypted session word. http://krimo666.mylivepage.com/
  • 9. Injected ID • An identifier can be entered (injected) in a receiver (IRD), this injected ID can be entered in a single or a group of IRDs. • This allows a BISS-E protected transmission to a group of IRDs. http://krimo666.mylivepage.com/
  • 10. Rate adaptation • MPEG null packets are stripped from the incoming transport stream. Then the scrambling algorithm is applied to the transport stream. • After that, MPEG null packets are multiplexed with the scrambled transport stream (stuffing) to arrive at the desired output rate. http://krimo666.mylivepage.com/
  • 11. Operation BISS mode 1 • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode 1 with clear session word, enter the 12 digit session word. • Communicate the session word to the receive site(s). http://krimo666.mylivepage.com/
  • 12. Operation BISS mode E with buried ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with buried ID, get the buried ID of the IRD and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site. http://krimo666.mylivepage.com/
  • 13. Operation BISS mode E with injected ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with injected ID, get the injected ID of the IRD(s) and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site(s). http://krimo666.mylivepage.com/
  • 14. Summary • BISS mode 1 => session word (SW) • BISS mode E => encrypted session word (ESW) – SW + injected or buried ID -> ESW • Rate adaptation End Plus de Livres Electronique : Cinema,Presse,Cuisine Litterature,Politique Religion,SciencePhilosophie Mecanique,Informatique http://kitab.synthasite.com/ http://krimo666.mylivepage.com/