Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Users  





2 Versions  





3 Operating principle  





4 Attacks  



4.1  Card attacks  





4.2  Datastream attacks  





4.3  Decoder card datastream attacks  





4.4  Brute force  







5 References  














VideoCrypt






Español
Français
Türkçe
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Example of a PAL video fields scrambled by VideoCrypt I

VideoCrypt is a cryptographic, smartcard-based conditional access television encryption system that scrambles analogue pay-TV signals. It was introduced in 1989 by News Datacom and was used initially by Sky TV and subsequently by several other broadcasters on SES' Astra satellites at 19.2° east.

Users

[edit]
Broadcaster Market Medium
British Sky Broadcasting United Kingdom, Ireland SES' Astra satellites
The Adult Channel Europe SES' Astra satellite
JSTV Europe SES' Astra satellite
SKY Network Television New Zealand terrestrial UHF (ended 10 March 2010)
Sky Fiji Fiji terrestrial VHF
Multichoice Africa, Europe SES' Astra satellite (videocrypt II)
Foxtel (until 2005) Australia Telstra terrestrial HFC
BBC SelectonBBC1 and BBC2 (1992-1994) United Kingdom terrestrial UHF (VideoCrypt-S implementation)
ANTV (1994-1998) Indonesia Palapa satellite (sports and selected foreign programming only)
TPI (1994-1999) Indonesia Palapa satellite (sports and selected foreign programming only)
Indosiar (1995-1999) Indonesia Palapa satellite (sports and selected foreign programming only)

Versions

[edit]

Three variants of the VideoCrypt system were deployed in Europe: VideoCrypt I for the UK and Irish market and VideoCrypt II for continental Europe. The third variant, VideoCrypt-S was used on a short-lived BBC Select service. The VideoCrypt-S system differed from the typical VideoCrypt implementation as it used line shuffle scrambling.

Operating principle

[edit]

The system scrambles the picture using a technique known as "line cut-and-rotate". Each line that made up each picture (video frame) is cut at one of 256 possible "cut points", and the two halves of each line are swapped around for transmission. The series of cutpoints is determined by a pseudo-random sequence. Channels were decoded using a pseudorandom number generator (PRNG) sequence stored on a smart card (aka Viewing Card).

To decode a channel the decoder would read the smart card to check if the card is authorised for the specific channel. If not, a message would appear on screen. Otherwise the decoder seeds the card's PRNG with a seed transmitted with the video signal to generate the correct sequence of cut points.

The system also included a cryptographic element called the Fiat Shamir Zero Knowledge Test. This element was a routine in the smartcard that would prove to the decoder that the card was indeed a genuine card. The basic model was that the decoder would present the card with a packet of data (the question or challenge) which the card would process and effectively return the result (the answer) to the decoder proving that it was a genuine card without disclosing any critical information. If the decoder received the wrong result from the card, it was supposed to stop decoding the video. However a technologically insecure implementation of this otherwise strong cryptographic element made it redundant.

The VideoCrypt-S variant, used by the BBC Select service, was based on line shuffle scrambling. This form of video scrambling changes the order in which lines are transmitted thus line 20 may be transmitted as line 32. The VideoCrypt-S variant used six blocks of forty seven lines per field. It had three scrambling formats: full shuffle in which 282 lines were affected; half shuffle, in which every alternate field was scrambled; and a line delay scramble in which the start position of the video in each line was pseudo-randomly delayed. The BBC chose to use line shuffle scrambling rather than line cut-and-rotate because tests had shown that line cut-and-rotate is more susceptible to picture degradation when exposed to ghosting and co-channel interference conditions commonly present in terrestrial transmissions.[1]

Attacks

[edit]

The VideoCrypt system was far from secure and a number of hacks were employed.

Card attacks

[edit]

Datastream attacks

[edit]

Decoder card datastream attacks

[edit]

Brute force

[edit]

References

[edit]
  1. ^ "BBC R&D - LINE SHUFFLING: Development of a scrambling system for terrestrial UHF television broadcasts" (PDF).

Retrieved from "https://en.wikipedia.org/w/index.php?title=VideoCrypt&oldid=1220792291"

Categories: 
Satellite television
Digital rights management systems
Television technology
1989 introductions
Telecommunications-related introductions in 1989
Audiovisual introductions in 1989
Hidden categories: 
Articles with short description
Short description matches Wikidata
Articles needing additional references from May 2023
All articles needing additional references
All articles with unsourced statements
Articles with unsourced statements from June 2014
 



This page was last edited on 25 April 2024, at 23:06 (UTC).

Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



Privacy policy

About Wikipedia

Disclaimers

Contact Wikipedia

Code of Conduct

Developers

Statistics

Cookie statement

Mobile view



Wikimedia Foundation
Powered by MediaWiki