articles
Ed's View - Keeping Honest People Honest
In April 1803, President Thomas Jefferson gave Meriwether Lewis (of the Lewis and Clark Expedition fame) a rather sophisticated key-based cipher table. This table was to be used to encrypt messages intended for the President in Washington if those messages would be sent via a foreign carrier, such as a foreign ship, when the expedition reached the Pacific Ocean. But, alas, the cipher table was never used as no ships came while the expedition was camped there. The point of this anecdote is that the concept of encrypted messages for security and content protection reasons is not new. In fact, language encryption has been around as long as man has been literate (about 10,000 years). It has been surmised that encoding words and speech is one of the reasons different languages developed. May be, but one thing is common with all of the various encrypting schemes through the ages - they all have been broken, no matter how sophisticated.
Today's encryption systems are unbelievably complex with multiple layers of protection. But no matter what is devised, there is some teenager in West Pump Handle, Iowa, who will break the code - simply because it is there to be broken. "But," you muse, "that would take a supercomputer." Yes, that is correct. However, those will be available next year from Circuit City, Best Buy, Dell, et al. The point is: about the only thing even the most complex encryption systems can do is to keep honest people honest.
Carrying this logic to its next level, since encryption is used to enable content protection, and since it will be compromised, there is really no ultimate technical solution to the dilemma confounding content protection. But technology can make content protection very difficult to compromise, easier to enforce, and, therefore, a very useful tool in advancing the entertainment and information value of HDTV. Yes, my view is that content protection technology is a good thing, indeed a very necessary element for insuring the economic viability of HDTV.
I will expound on this further, but first let's review, at a high level, some of the salient concepts of modern content protection and associated technology:
Content Protection is the overall term given to the process of protecting content from being obtained in any usable form by non-authorized receivers.
Encryption is a means to achieve content protection. Encryption involves encoding the sensitive content in some manner known only by the sender and receiver.
Conditional Access is the means used to provide the receiver accessibility to the encrypted content he is authorized or entitled to receive. Electronically, at the receiver, the content protection mechanism is analogous to a sophisticated switch that allows the passage of the signal to the decrypting circuitry. Usually, the "switch" is triggered by a received code tied to the receiver's identification and/or serial number. These codes are called Entitlement Control Messages or ECM's.
Conditional access is also used to authorize various tiers of services to which the viewer has subscribed. Think of conditional access as an electronic "truck roll" in the early analog cable TV context. After the customer subscribed to the cable service, the cable technician would connect the cable to provide basic service. The technician my also have removed "traps" at the cable terminal (usually located on a nearby power pole) to allow the reception of higher tiers of service, such as HBO etc. In many instances, this "manual" process continues to be the way conditional Cable provides conditional access, particularly in rural communities.
The conditional access ECM's may or may not be sent along with, or in the same frequency band, as the encrypted content. They also can be transmitted at varying times and in addition with other digital "housekeeping" data. In the digital context the ECM"s, along with this housekeeping data are usually packaged in a separate "Service Channel."
Scrambling is usually the method used to encrypt the digital content. As the name implies, scrambling involves rearrangement of the data in a manner that makes it unintelligible until it is de-scrambled at the receiving end. The scrambling algorithm, or cipher, can be very complex, and may dynamically change to provide added security. But added complexity consumes added bandwidth. Scrambling algorithms, along with the service data, may consume as much as 1/3rd or more of the channel bandwidth. However, from the code-breakers' standpoint, the scrambling algorithm itself is the easiest to break. What is difficult is decoding the key. Without the key mechanism, many honest people would become dishonest.
The key or keyword (a.k.a. "the secret") is the most important and critical part of any modern encryption system. One may think of the scrambling algorithm as the "how" and the key as the "what."
Here is a very simple example:
Suppose the word "CAT" is scrambled as "DBU." In this case the scrambling algorithm is: Move each letter forward in the alphabet a specific amount. The key is "one." Therefore, each letter is moved forward one alphabetical position.
The key can be an algorithm itself and can be changed at varying times - once a minute, once a second, etc. However, at the heart of the key algorithm is a "kernel," which is usually a number of absolute value. The kernel can also be changed periodically by what is called a "pseudorandom number table." Regardless of how it is done, both the sender and receiver must know the key. If the key is compromised, the encryption system is comparatively easily broken. There are numerous military historical instances of cipher keys being stolen, allowing one combatant to successfully decipher messages sent by the other.
But, in the very recent years, key management has become so complex that it is extremely difficult and costly for the casual hacker to break the encrypting code. They, of course, will be broken, but most likely by those with truly dishonest intensions.
Copy Protection is the mechanism that allows, disallows or otherwise manages the copying of content on a suitable copying media once the receiver has been authorized access to the content. Copy protection, and therefore copyright protection, is one of the most contentious issues surrounding HDTV. Generally, copy protection works by disallowing or limiting the operation of the recording device. It is insufficient to simply disallow only the recording of decrypted (in-the-clear) content, because once the material is recorded, even though encrypted, it can be examined bit by bit by the code breaker, eventually being broken.
Mechanisms are being developed, called "Encoding Rules," that will allow the management of recording rights. These Encoding Rules involve codes that allow varying levels of customer recording access, such as "copy never," "copy once," or "copy many times." To signal the receiver that the content is transmitted with encoding rules, a small bit of data called the "broadcast flag" is sent along with the digital program stream. The Encoding Rules concept represents a workable compromise between copy protection and established recording rights.
It is interesting to note that in the several FCC Report and Orders establishing the DTV transition, the issue of copy protection was not addressed. Only after the ability to create an infinite number of perfect replications of the digital material was realized did copy protection become an issue.
Link (Interface) Protection refers to the protection of content coupled from a host (e.g. Cable Box) to a client (e.g. Display). It is necessary to protect these links to prevent interception of the in-the-clear data that has been de-scrambled by the host. Two examples of this technology are currently being employed. These are the DTV Link (encrypted IEEE 1594) and the High Definition Multimedia Interface (HDMI). Both use scrambling algorithms with "handshaking" scheme. The handshaking process involves the host and client ends of the link communicating with each other before the data is transferred across the link. This assures the client is entitled to receive data from the host. Handshaking communication virtually eliminates a breach do to the so-called "man-in-the-middle" attack, which is an attempt to intercept the link data stream.
Watermarking refers to codes, visible and/or invisible, added to the video program material itself, analogous to network identifier "bugs" we see in the lower corners of the program display. The watermarking codes assist in tracking the source of the displayed material from its origination through the recording device. The recording device itself also may "stamp" a watermark code to the video. Watermarking greatly aids enforcement of copy protection rules by tracking the source of any illegal recordings.
Successful content and copy protection mechanisms are absolutely necessary for the advancement of HDTV. The economic model of television broadcasting is changing significantly. No longer can producers depend on advertising to support the added costs of HDTV production values, quality talent and program creation. Advertising income is becoming increasingly fragmented due to the "narrow-casting" phenomenon of multiple networks.
Add this to the fact that the movie industry is now deriving more than 50% of its revenues from DVD's (plus video tape and PPV), and it becomes absolutely necessary for our primary creative industry to protect these revenue streams. And as HDTV receivers and HDTV DVD's become increasingly more popular, truly emulating the theater experience, the content providers' revenue will become even more dependent on the prerecorded video streams.
It will not be long until we will be able to download and/or stream HDTV content. This will not be possible without content protection. Content protecting is the mechanism that will allow us to receive increasingly more diverse, high quality HDTV content. We must do all we can to embrace and support this technology and keep honest people honest. If we do, HDTV will only get better.
Ed
___________________
About Ed Milbourn
After graduating from Purdue University with degrees in Electrical Engineering and Industrial Education in 1961 and 1963 respectively, Ed Milbourn joined the RCA Home Entertainment Division in 1963. During his thirty-eight year career with RCA (later GE and Thomson multimedia), Mr. Milbourn held the positions of Field Service Engineer, Manager of Technical Training and Manager of Sales Training. In 1987, he joined Thomson's Product Management group as Manager of Advanced Television Systems Planning, with responsibilities including Digital Television and High Definition Television Product Management. Mr. Milbourn retired from Thomson multimedia in December 2001, and is now a Consumer Electronics Industry consultant.
