Abstract | ||
---|---|---|
In 2008, Jeong et al. proposed a novel protocol for a downloadable conditional access system (DCAS). They claimed that their protocol provided mutual authentication and secure downloading of conditional access (CA) software. However we show that their protocol has a fatal weakness such that it is insecure to the impersonation attack. So, we propose the improved protocol based on their protocol. Moreover, we hope that by showing this design flaw, similar mistakes can be avoided in future designs. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1145/2184751.2184831 | ICUIMC |
Keywords | Field | DocType |
downloadable cas,novel protocol,conditional access,secure downloading,design flaw,future design,mutual authentication,impersonation attack,fatal weakness,improved protocol,downloadable conditional access system | Wide Mouth Frog protocol,Mutual authentication,Conditional access,Downloadable Conditional Access System,Computer security,Computer science,Upload,Otway–Rees protocol,Computer network,Authentication protocol,Software | Conference |
Citations | PageRank | References |
0 | 0.34 | 6 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hanjae Jeong | 1 | 11 | 2.31 |
Seungjoo Kim | 2 | 939 | 84.84 |
Dongho Won | 3 | 1262 | 154.14 |