Design and Implementation of KASUMI Algorithm in ISMACryp Encryption for Video Content Protection in DVB-H Application

Article Preview

Abstract:

Three technologies can be used for content protection in DVB-H; IPSec, SRTP and ISMACryp. ISMA Encryption and Authentication is one of the three chosen technologies for service protection in DVB-H (Digital Video Broadcasting - Handheld), the TV system for portable handheld devices. This paper deals with modification in ISMACryp. The ISMACryp is encoded with MPEG-4 video and MPEG-4 AAC (advanced audio coding), while leaving all structural data as it is. Two modes of ISMACryp are available; the CTR mode (Counter type) and CBC mode (Cipher Block Chaining) mode. Both modes of ISMACryp is based on 128-bit AES algorithm. AES algorithms are more complex and require larger time with more clock cycles for execution. This paper is being first simulate and implement existing ISMACryp using 128-bit Rijndael algorithm and then modified it with KASUMI algorithm that will be provided lower number of clock pulses with lower execution time. The simulation is done in Matlab and implementation in TMS320C6713 DSP kit.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

3847-3853

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Stefan Doehla, Systems Engineer, Fraunhofer IIS , DVB-H handheld video content protection with ISMA Encryption, pp.1-10, July (2007).

Google Scholar

[2] ISMA Encryption and Authentication, Version 1. 1; AREA / Task Force: DRM, September (2006).

Google Scholar

[3] ISMA Encryption and Authentication Version 2. 0; External Proposed Specification ; AREA / Task Force: DRM, November (2007).

Google Scholar

[4] Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification, 3GPP TS 35. 202, (2009).

Google Scholar

[5] D. McGrew, S. Fluhrer , Attacks on Encryption of Redundant Plaintext and Implications on Internet Security, Seventh Annual Workshop on Selected Areas in Cryptography (SAC), (2000).

DOI: 10.1007/3-540-44983-3_2

Google Scholar

[6] J. Daemen, V. Rijmen, The Block Cipher Rijndael, Smart Card Research and Applications, LNCS 1820. J. -J. Quisquater and B. Schneier, Eds., pp.288-296 Springer-Verlag, (2000).

DOI: 10.1007/10721064_26

Google Scholar

[7] J. Daemen and V. Rijmen, Rijndael, the advanced encryption standard, " Dr. Dobb, s Journal , Vol. -26, No. -3, pp. -137—139, March (2001).

Google Scholar

[8] Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti and Stefano Marchesin, Efficient Software Implementation of AES on 32-Bit Platforms, LNCS 2523, p.159–171, Springer-Verlag (2003).

DOI: 10.1007/3-540-36400-5_13

Google Scholar

[9] 3G Security: Specification of A5/3 Encryption algorithms for GSM and ECSD, and the GEA3 Encryption algorithm for GPRS,; 3GPP TS 55. 216 V6. 2. 0 (2003-2009).

Google Scholar

[10] E. Biham, A Note Comparing the AES Candidates, revised version, NIST, (1999).

Google Scholar

[11] L. Knudsen, Some Thoughts on the AES Process,, NIST, Apr (1999).

Google Scholar

[12] N. Ferguson, J. Kelsey, B. Schneier, M. Stay, D. Wagner, and D. Whiting, Improved Cryptanalysis of Rijndael, Proceedings of the Seventh Fast Software Encryption Workshop, Springer-Verlag, (2000).

DOI: 10.1007/3-540-44706-7_15

Google Scholar

[13] Kühn, Ulrich. Cryptanalysis of Reduced Round MISTY,. EUROCRYPT, (2001).

Google Scholar