• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Tao, Wu Chuankun, Zhang Weiming. A White-Box-Cryptography-Based Scheme for the Secure Chip of DCAS Terminal[J]. Journal of Computer Research and Development, 2016, 53(11): 2465-2474. DOI: 10.7544/issn1000-1239.2016.20150546
Citation: Xu Tao, Wu Chuankun, Zhang Weiming. A White-Box-Cryptography-Based Scheme for the Secure Chip of DCAS Terminal[J]. Journal of Computer Research and Development, 2016, 53(11): 2465-2474. DOI: 10.7544/issn1000-1239.2016.20150546

A White-Box-Cryptography-Based Scheme for the Secure Chip of DCAS Terminal

More Information
  • Published Date: October 31, 2016
  • In the technical specification of downloadable conditional access system (DCAS) issued by the State Administration of Radio, Film and Television of China (SARFT) in 2012, all cryptographic operations in a terminal are built into a secure chip and protected with hardware-based security technologies. Too much protected black-box contents in the secure chip, however, will lower the universality and flexibility of the chip, and add the cost of research and development. Thus, an improved scheme for the secure chip of DCAS terminal is proposed, which is based on white-box cryptography. The main idea is to replace the key ladder inside the chip by a software-based white-box decryption module outside the chip and an external encoding inside the chip. An algorithm of generating external encoding is put forward, which is executed in the secure chip and based on the protected secret key and the external input parameters. The decryption and authentication processes in the terminal are redesigned. Compared with the original scheme in the DCAS technical specification, the improved scheme not only overcomes the aforementioned deficiencies, but also provides two extra benefits: the decryption algorithm can be renewed while the service key is being downloaded from the network; the new authentication process can verify the legitimacy as well as the uniqueness of a DCAS terminal.
  • Related Articles

    [1]Xue Xin, Zhu Tianchen, Sun Qingyun, Zhou Haoyi, Li Jianxin. Efficient Subgraph Matching Algorithm with Graph Neural Network[J]. Journal of Computer Research and Development, 2025, 62(3): 694-708. DOI: 10.7544/issn1000-1239.202330732
    [2]Shang Jing, Wu Zhihui, Xiao Zhiwen, Zhang Yifei. Graph4Cache: A Graph Neural Network Model for Cache Prefetching[J]. Journal of Computer Research and Development, 2024, 61(8): 1945-1956. DOI: 10.7544/issn1000-1239.202440190
    [3]Zhang Tianming, Xu Yiheng, Cai Xinwei, Fan Jing. A Shortest Path Query Method over Temporal Graphs[J]. Journal of Computer Research and Development, 2022, 59(2): 362-375. DOI: 10.7544/issn1000-1239.20210893
    [4]Guo Fangfang, Wang Xinyue, Wang Huiqiang, Lü Hongwu, Hu Yibing, Wu Fang, Feng Guangsheng, Zhao Qian. A Dynamic Stain Analysis Method on Maximal Frequent Sub Graph Mining[J]. Journal of Computer Research and Development, 2020, 57(3): 631-638. DOI: 10.7544/issn1000-1239.2020.20180846
    [6]Lu Jianhua, Zhang Baili, Jiang Shan, Lu Ningyun, Wang Feifei. Selection-Verification-Filtering: An Iterative Subgraph Containment Query Processing Strategy[J]. Journal of Computer Research and Development, 2012, 49(10): 2221-2228.
    [7]Ou Xiaoping, Wang Chaokun, Peng Zhuo, Qiu Ping, and Bai Yiyuan. A Graph-Based Music Data Model and Query Language[J]. Journal of Computer Research and Development, 2011, 48(10): 1879-1889.
    [8]Zhang Xu, He Xiangnan, Jin Cheqing, and Zhou Aoying. Processing k-Nearest Neighbors Query over Uncertain Graphs[J]. Journal of Computer Research and Development, 2011, 48(10): 1871-1878.
    [9]Zhang Lin, Zhang Li. Software Superfamilies Based on Sub-Graph Significance Profile[J]. Journal of Computer Research and Development, 2011, 48(2): 251-258.
    [10]Li Zhoujun, Chen Yiming, Liu Junwan, Chen Huowang. A Survey of Computational Method in Protein-Protein Interaction Research[J]. Journal of Computer Research and Development, 2008, 45(12): 2129-2137.

Catalog

    Article views (1193) PDF downloads (417) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return