SlideShare a Scribd company logo
Basics of BISS scrambling




        http://krimo666.mylivepage.com/
Contents



•   Definition of scrambling
•   BISS modes
•   BISS mode 1
•   BISS mode E
•   Calculation of encrypted session word
•   Buried ID
•   Injected ID
•   Connection diagram
•   Rate adaptation
•   Back panel description
•   Operation




                    http://krimo666.mylivepage.com/
Scrambling



•   Scrambling is a way to transform transmitted data in
    order to allow reception only by parties that have a valid
    descrambling key.

•   An open standard has been defined to allow different
    manufactures to implement the same scrambling system.

•   BISS = Basic Interoperable Scrambling System




                     http://krimo666.mylivepage.com/
BISS modes



•   BISS mode 0 : unscrambled (clear)
•   BISS mode 1 : scrambled with session word (SW)
•   BISS mode E : scrambled with encrypted session word
                  (ESW)


•   The session word is the key that is used in the receiver
    (IRD) to descramble the transmitted data.

•   Remark that BISS-E uses the same scrambling algorithm
    as BISS mode 1 but that there is an additional encryption
    on the session word.




                     http://krimo666.mylivepage.com/
BISS mode 1



•   BISS mode 1 uses a 12 digit hexadecimal key as session
    word. The session word has to be announced to all
    parties that are allowed to descramble the received data.

•   Example : 123456ABCDEF

•   The session word can easily be compromised, there is no
    protection when communicating it to the receive site(s).




                     http://krimo666.mylivepage.com/
BISS mode E



•   BISS mode E : scrambled with encrypted session word
    (ESW)

•   This mode uses the ID (identifier) of the receiver(s) and
    a session word to calculate an encrypted session word
    (16 digits hex)

•   There are two possible IDs               - buried ID
                                             - injected ID

•   By encrypting the session word there is an additional
    protection on the session word. The ESW can be
    communicated using a non-secure channel since in order
    to descramble the received signal both the ID and the
    ESW need to be known.


                     http://krimo666.mylivepage.com/
Calculation of encrypted session word


   Define a SW                                        Get the ID


                    Calculate ESW


                    Exchange ESW


                 Enter ESW in IRD(s)

  To calculate the ESW the DES3 algorithm is used

                    http://krimo666.mylivepage.com/
Buried ID



•   Each receiver (IRD) holds a unique ID (cfr. serial
    number) that can be used to identify that specific
    receiver : this is called the buried ID.

•   If you want to do a transmission that is to be received by
    only one specific receiver, use the buried ID to calculate
    the encrypted session word.




                     http://krimo666.mylivepage.com/
Injected ID



•   An identifier can be entered (injected) in a receiver
    (IRD), this injected ID can be entered in a single or a
    group of IRDs.

•   This allows a BISS-E protected transmission to a group of
    IRDs.




                     http://krimo666.mylivepage.com/
Rate adaptation



•   MPEG null packets are stripped from the incoming
    transport stream. Then the scrambling algorithm is
    applied to the transport stream.

•   After that, MPEG null packets are multiplexed with the
    scrambled transport stream (stuffing) to arrive at the
    desired output rate.




                     http://krimo666.mylivepage.com/
Operation BISS mode 1



•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode 1 with clear session word, enter
    the 12 digit session word.
•   Communicate the session word to the receive site(s).




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with buried ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with buried ID, get the buried ID
    of the IRD and use this together with a session word to
    calculated the encrypted session word (using the DES3
    algorithm).
•   Communicate the ESW to the receive site.




                    http://krimo666.mylivepage.com/
Operation BISS mode E
with injected ID


•   Connect the scrambler between the encoder and
    modulator.
•   Select output interface rate (must be equal or higher
    than output interface rate of the encoder)
•   Select BISS mode.
•   In case of BISS mode E with injected ID, get the injected
    ID of the IRD(s) and use this together with a session
    word to calculated the encrypted session word (using the
    DES3 algorithm).
•   Communicate the ESW to the receive site(s).




                     http://krimo666.mylivepage.com/
Summary



   •    BISS mode 1 => session word (SW)
   •    BISS mode E => encrypted session word (ESW)

         –   SW + injected or buried ID -> ESW


   •    Rate adaptation


  End

Plus de Livres Electronique :
Cinema,Presse,Cuisine
Litterature,Politique
Religion,SciencePhilosophie
Mecanique,Informatique

http://kitab.synthasite.com/
                                http://krimo666.mylivepage.com/

More Related Content

Similar to Bassics Of Biss Scrambling

SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Encryption
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
vss gowtham
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Cryptography
CryptographyCryptography
Cryptography
Rohan04
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Pgp1
Pgp1Pgp1
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Punnya Babu
 
Secure communication
Secure communicationSecure communication
Secure communication
Denys Haryachyy
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
UC San Diego
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
SJDalore1
 
Cryptography
CryptographyCryptography
Cryptography
Sahil chawla
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
Bitcoin Association of Australia
 

Similar to Bassics Of Biss Scrambling (20)

SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Pgp1
Pgp1Pgp1
Pgp1
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Secure communication
Secure communicationSecure communication
Secure communication
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdfAdvanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 

Recently uploaded

The Six Working Genius Short Explanation
The Six Working Genius Short ExplanationThe Six Working Genius Short Explanation
The Six Working Genius Short Explanation
abijabar2
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Best Way to Overcome Procrastination and Increase Productivity.pdf
Best Way to Overcome Procrastination and Increase Productivity.pdfBest Way to Overcome Procrastination and Increase Productivity.pdf
Best Way to Overcome Procrastination and Increase Productivity.pdf
Million-$-Knowledge {Million Dollar Knowledge}
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Strategies to rekindle the fire inside you and stay motivated.pdf
Strategies to rekindle the fire inside you and stay motivated.pdfStrategies to rekindle the fire inside you and stay motivated.pdf
Strategies to rekindle the fire inside you and stay motivated.pdf
Million-$-Knowledge {Million Dollar Knowledge}
 
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
CANSA The Cancer Association of South Africa
 
aula open english sobre Classic-motorcycles-2_1.pdf
aula open english sobre Classic-motorcycles-2_1.pdfaula open english sobre Classic-motorcycles-2_1.pdf
aula open english sobre Classic-motorcycles-2_1.pdf
PauloVictor90882
 

Recently uploaded (8)

The Six Working Genius Short Explanation
The Six Working Genius Short ExplanationThe Six Working Genius Short Explanation
The Six Working Genius Short Explanation
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
 
Best Way to Overcome Procrastination and Increase Productivity.pdf
Best Way to Overcome Procrastination and Increase Productivity.pdfBest Way to Overcome Procrastination and Increase Productivity.pdf
Best Way to Overcome Procrastination and Increase Productivity.pdf
 
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotesUnderstanding of Self - Applied Social Psychology - Psychology SuperNotes
Understanding of Self - Applied Social Psychology - Psychology SuperNotes
 
Strategies to rekindle the fire inside you and stay motivated.pdf
Strategies to rekindle the fire inside you and stay motivated.pdfStrategies to rekindle the fire inside you and stay motivated.pdf
Strategies to rekindle the fire inside you and stay motivated.pdf
 
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
The Secret Warrior - Help Share a Parent or Loved Ones’ Cancer Diagnosis with...
 
aula open english sobre Classic-motorcycles-2_1.pdf
aula open english sobre Classic-motorcycles-2_1.pdfaula open english sobre Classic-motorcycles-2_1.pdf
aula open english sobre Classic-motorcycles-2_1.pdf
 

Bassics Of Biss Scrambling

  • 1. Basics of BISS scrambling http://krimo666.mylivepage.com/
  • 2. Contents • Definition of scrambling • BISS modes • BISS mode 1 • BISS mode E • Calculation of encrypted session word • Buried ID • Injected ID • Connection diagram • Rate adaptation • Back panel description • Operation http://krimo666.mylivepage.com/
  • 3. Scrambling • Scrambling is a way to transform transmitted data in order to allow reception only by parties that have a valid descrambling key. • An open standard has been defined to allow different manufactures to implement the same scrambling system. • BISS = Basic Interoperable Scrambling System http://krimo666.mylivepage.com/
  • 4. BISS modes • BISS mode 0 : unscrambled (clear) • BISS mode 1 : scrambled with session word (SW) • BISS mode E : scrambled with encrypted session word (ESW) • The session word is the key that is used in the receiver (IRD) to descramble the transmitted data. • Remark that BISS-E uses the same scrambling algorithm as BISS mode 1 but that there is an additional encryption on the session word. http://krimo666.mylivepage.com/
  • 5. BISS mode 1 • BISS mode 1 uses a 12 digit hexadecimal key as session word. The session word has to be announced to all parties that are allowed to descramble the received data. • Example : 123456ABCDEF • The session word can easily be compromised, there is no protection when communicating it to the receive site(s). http://krimo666.mylivepage.com/
  • 6. BISS mode E • BISS mode E : scrambled with encrypted session word (ESW) • This mode uses the ID (identifier) of the receiver(s) and a session word to calculate an encrypted session word (16 digits hex) • There are two possible IDs - buried ID - injected ID • By encrypting the session word there is an additional protection on the session word. The ESW can be communicated using a non-secure channel since in order to descramble the received signal both the ID and the ESW need to be known. http://krimo666.mylivepage.com/
  • 7. Calculation of encrypted session word Define a SW Get the ID Calculate ESW Exchange ESW Enter ESW in IRD(s) To calculate the ESW the DES3 algorithm is used http://krimo666.mylivepage.com/
  • 8. Buried ID • Each receiver (IRD) holds a unique ID (cfr. serial number) that can be used to identify that specific receiver : this is called the buried ID. • If you want to do a transmission that is to be received by only one specific receiver, use the buried ID to calculate the encrypted session word. http://krimo666.mylivepage.com/
  • 9. Injected ID • An identifier can be entered (injected) in a receiver (IRD), this injected ID can be entered in a single or a group of IRDs. • This allows a BISS-E protected transmission to a group of IRDs. http://krimo666.mylivepage.com/
  • 10. Rate adaptation • MPEG null packets are stripped from the incoming transport stream. Then the scrambling algorithm is applied to the transport stream. • After that, MPEG null packets are multiplexed with the scrambled transport stream (stuffing) to arrive at the desired output rate. http://krimo666.mylivepage.com/
  • 11. Operation BISS mode 1 • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode 1 with clear session word, enter the 12 digit session word. • Communicate the session word to the receive site(s). http://krimo666.mylivepage.com/
  • 12. Operation BISS mode E with buried ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with buried ID, get the buried ID of the IRD and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site. http://krimo666.mylivepage.com/
  • 13. Operation BISS mode E with injected ID • Connect the scrambler between the encoder and modulator. • Select output interface rate (must be equal or higher than output interface rate of the encoder) • Select BISS mode. • In case of BISS mode E with injected ID, get the injected ID of the IRD(s) and use this together with a session word to calculated the encrypted session word (using the DES3 algorithm). • Communicate the ESW to the receive site(s). http://krimo666.mylivepage.com/
  • 14. Summary • BISS mode 1 => session word (SW) • BISS mode E => encrypted session word (ESW) – SW + injected or buried ID -> ESW • Rate adaptation End Plus de Livres Electronique : Cinema,Presse,Cuisine Litterature,Politique Religion,SciencePhilosophie Mecanique,Informatique http://kitab.synthasite.com/ http://krimo666.mylivepage.com/