17 Dec
2003
17 Dec
'03
11:17 p.m.
Mike Duvos writes:
In the system I described, a person might make a lower bandwidth attempt to defeat the system by leaking either the periodically changing random session key used to encrypt the video stream, or the unique cryptographic key belonging to a particular smart card authorized to view the program. We have postulated that the latter is not recoverable even by destructive reverse engineering of a specific card,
Why not? If the card knows its own key, then someone else can probably get the key out by some nasty mechanism. .pm