The Videocrypt System
*** The Videocrypt System ***
An Overview
Researched and written by Darren Ingram, author of Satnews
- Satnews.. the latest and non-Commercial satellite news -
Version 1.31 - 06.05.91
Introduction
Videocrypt is a pay-tv scrambling system jointly developed by Thom-
son Consumer Electronics and News Datacom. Over one million users
receive Videocrypt encrypted signals and this system, has to date,
remained secure from illicit decoder manufacturers, protecting the
revenue of Videocrypted television channels.
Requirements
Videocrypt is a multi-standard encryption system which is suitable
for PAL, NTSC and SECAM transmissions. Language is no barrier for
Videocrypt with its capacity for multi-lingual transmissions and
broadcasts utilising a comprehensive on-screen instruction menu.
Features and applications
A smart card is the central key to the Videocrypt system, and the
card can be used for a variety of diverse applications. The card
is pre-coded to determine a users requirements and it can subse-
quently be addressed utilising the decoders logic to amend the users
services at the broadcasters will.
There are a number of broadcasting modes which the smart card can be
used within including:
Clear Mode
Signals sent in the clear are recognised by the decoder and
passed to the display without further processing.
Free Access
Pictures transmitted with an encryption key are delivered
directly to the display through the decoder.
Controlled Access
Access to encrypted pictures is determined by the level
of access authorised to the users smart card. No signals
will be transmitted in an unencrypted state without prior
authorisation.
Programmes can be tailored to usage with the Videocrypt system and
the system offers a flexible way for pay-tv operators. There are a
number of operations mode offered as standard including:
* Single or multiple subscriptions with many tier levels in one
channel
* Pay Per View (PPV) and impulse purchasing
* Thematic selection (enable all arts programming)
* Geographic limitation (restrict to a country/area)
* Single-event (throwaway cards)
* Parental Control (reception with card only)
* Pre-determined time period
Videocrypt enables smart cards to be pre-programmed to suit the
specific programming requirements.
Smart card - providing the revenue security
Security can be addressed on a multitude of levels when using the
smart card. These include:
Chaining
An existing customer would receive a new card which contains part of
the new code, the remainder of the code would be transmitted when
the card is inserted into the decoder and the subscriber compiles
with the instructions contained within the on-screen graphics.
Over-the-air addressing
Systems operators can now address individual subscribers, which is a
vast improvement over other scrambling systems. The operator can
provide additional services, reduce service entitlements, send
individual messages, blacklist and/or whitelist viewers.
Cloning
A number of steps have been taken to stop smart cards being copied
or cloned. A physical deterrent is the first line of defence, and
the integrated circuit contained within the card makes "probing"
very difficult as the IC is likely to become damaged in the process.
Cost is a second factor which is likely to deter manufacturers of
illegal decoders. A considerable amount of time, trouble and
expensive resources would be required to clone the card.
The manufacturers of Videocrypt recommend that the cards are re-
placed every six months, and each time this is done a "secret en-
crypting algorithm" will be changed. Any pirate decoders manufac-
tured during this time would be relatively useless.
And should a pirate decoder be manufactured, it will contain a
unique security code, which could be blacklisted by the systems
operator once the code has been discovered - leading to calls of
complaint by angry customers.
Video taping
Videocrypt offers an simple method of tracking down pirates who
video high-value programming and then distribute it.
The customers unique number can be displayed on the unencoded screen
for reference and future litigation. Although an on-the-screen
code can be generated for signals piracy in a public place, the
codes can be hidden in the picture - and retrieved by a technician
at a later stage.
Videocrypt-your flexible friend?
Videocrypt can be used in a number of applications other than tv
signals protection. They include:
Messaging, messages can be transmitted to individual subscribers or
to a group, so target messaging is now a potential. Messages like:
"Satellite owners in LONDON call 081 XXX XXXX now for a great bar-
gain".
Selling, sales over the air can be utilised with the unique identity
number which verifies an owner and their registered address. Data
can be matrixed with a user personality during ad-breaks to tailor-
make the advertisement.
A unique transaction alphanumeric can be displayed on the TV screen,
and the subscriber will telephone a given number and quote the
alphanumeric - and the deal can then be completed in total security.
Scrambling
The majority of scrambling systems currently on the market are
dependent on analogue processing circuitry, and it is a hard task to
get a secure system without picture deterioration.
Videocrypt can encode and decode a picture without degradation.
The crux of the scrambling system evolves around a patented develop-
ment of Active Line Rotation (Cut and Rotate principle).
Every line of the signal is cut at a number or points along its
length, and this is chosen at random by a 60 bit psuedo random
binary sequence generator (PRBS). As each cut point differs from
the next the signal has no viewing value to an unauthorised recipi-
ent, but authorised recipients decoders recode the picture so that
the true state of the unscrambled line is always first out for
display.
The PRBS is re-seeded at times too, to enhance the security of the
system even more.
Before this ALR process can take place, the decoder needs to be
aware of the cut point on each of the transmitted lines, this is
provided within the encryption process. Each decoder utilises an
PRBS which reflects the characteristics of the system so that the
two halfs can be synchronised and a viewable picture displayed.
Data is transmitted in a series of over-the-air packets, which looks
like:
SYSTEM-----SMART or BLACKLIST
The system comprises of system data included Flat-Shamir identifica-
tion information, on-screen display messages, fingerprinting and
blacklisting data.
The smart card packet comprises of:
HEADER-----ENCRYPTED DATA-----CHECKSUM
The Videocrypt encryption system is based around a tightly-guarded
secret which has defeated system hackers throughout the world. A
final control algorithm is central to the systems security and this
can be changed at will if the system has been hacked.
Complex calculations are performed within the system in order not to
compromise its security.
But hackers who have attempted to hack the decoder will be disap-
pointed - as there are no secrets held within the system.
Smart Cards
The smart card offers great flexibility to the programme controller
and the viewer alike, and is the key to the Videocrypt system.
The Integrated circuits incorporated within the smart card have a
lot of power and contain EPROM elements which are partially burned
during their manufacture. The ICs are buried within the design to
make the system harder to penetrate.
Smart card block diagram
------- ------- -------
VCC -> - RAM - - ROM - -EPROM-
------- ------- -------
^ ^ ^
TO AND FROM
-------------------------------
GND -> - INTERNAL BUS -
-------------------------------
TO AND FROM
------- ------- -------
-8 BIT- -ANTI - -S/WRE-
RST -> -CPU - -FRAUD- -CNTRL-
- - -DVCES- -I/FCE-
------- ------- -------
CLK VPP I/O
Over the air addressing
Algorithmic information is transmitted to the viewer over the air,
encrypted within the Videocrypt system.
This data is transmitted within the Vertical Blanking Interval (VBI)
and four lines are employed for active data and two others, one
white and one black (for test purposes).
An application of Non Return To Zero (NRZ) with an constant energy
spectrum maximises the systems characteristics.
Four picture-sustaining techniques are used to ensure a high quality
picture. Bit interleaving, hamming codes, quadruple repetition and
check sums are used within the process.
The system can cope with fringe reception areas and will still
function correctly with high levels of noise.
Picture quality
Picture quality is paramount for any scrambling system and due to
the standard being of a digital origin, integrity of the signal is
maintained throughout the encryption and de-encryption process.
Amplitude sampling is conducted by the decoder and a 14MHz internal
clock ensures jitter-free pictures and unstable framing. A digi-
tally derived Automatic Gain Control (AGC) is also included within
the receiver.
Scrambling Sound
Videocrypt also has the capability of encrypting sound sources to
enhance the security of premium events. To date this level of
security has not been utilised by broadcasters.
The system of spectrum inversion renders the sounds received without
authorisation worthless. Videocrypt transposes the frequencies
transmitted and this in turn removed distortion of the sound.
Technical Data
(supplied by Thomson Consumer Electronics, 1991- subject to change)
VIDEOCRYPT BASEBAND DECODER
* Stand alone video decoder
* On screen display
* De emphasis switch
* Authorise button
* Integrated smart card reader
* Power indicator
PAL MODEL
Video input level IV +/- 3dB flat and clamped
Baseband input level 250 mV +/- 3dB, unclamped level
measured at pre-emphasised transition
frequency
Suitable de-emphasis CCIR 405-1
Video output level IV p.p. into 75 ohms
Video bandwith 50Hz - 4.8 Mhz -3dB typical
Line tilt <_ 1% typical
Luma/Chroma Delay +/- 50nS typical
S/N ratio: 50dB typical weighted
CONNECTIONS
AV Peritel (Scart)
Audio loopthrough Left and right
Pin 8 High with scrambled video input
Low with clear video input
Pin 16 5v 50mA maximum for external
modulator (OPTION)
MISCELLANEOUS
Standards Designed to IEC 65
Operating Temperature Range 5-40 C
Mains Input 216-255 V AC 50 Hz
Power Consumption 15W
Weight 2.5Kg
VIDEOCRYPT ENCODER (PAL/SECAM/NTSC)
* 19" rack mounting
* Active line cut and rotate
* Twin or single scrambler
* Separate power supply
* Integrated cooling unit
* Data for control access in the VBI
* RS232 interface
Video input level IV 75 ohm
Video output level IV peak to peak +/- 2% 75 ohm
Line tilt 0.5% typical
Base line distortion 0.5% typical
Chrominance to luminance 3% typical
2T/Bar ratio 2% typical
Synchro level 1% typical
S/n ratio RMS weighted >_ 67dB
Chrominance luminance:
intermodulation <_ 2%
differential gain 1% typical
differential phase 1" typical
luminance non-linearity 1% typical
chrominance/luminance delay +/- 10nS typical
video bandwith at 3dB >_ 5.8 Mhz
Output DC level 300 mV +/- 50 mV
Sampling frequency rejection >- 50dB at 14 Mhz
Number of bits per sample 10
CONNECTIONS
Connections to security comp RS232
Local VT100 terminal ditto
Video in BNC 75 ohm
Scrambled video out BNC 75 ohm
MISC
Local terminal functions are to
show working parameters
give warnings
control local
remote
autonomous
Select scrambling mode
clear
free access
control access
Mains input low pass filtering
Audio scrambling using spectrum
inversion 0dB/600 ohm (optional)
ENDS
**** Sky card hacking info 26/06/1993 ***
When the VideoCrypt system was launched, the press releases
claimed that it was the most pirateproof system yet devised. Some
of the people involved in the design of the system claimed that it
would take billions of years to break the codes used by the
system. The usual media journalists swallowed this hook line and
sinker. The hackers knew otherwise.
The VideoCrypt system is the mainstay of the BSkyB satellite
television empire. It is the means by which BSkyB makes its money
from the subscribers. The basic theory is that they pay a
subscription for the premium channels and they receive a smart
card. This smart card, when inserted into the VideoCrypt decoder
will allow the decoder to descramble the channels paid for. It is
also possible for BSkyB to turn off the cards of those subscribers
who have not paid.
Hacking scrambling systems such as VideoCrypt is a multi-million
pound industry. Due to the present legal situation it is perfectly
legal to hack a channel that originates outside the UK. However
for someone in the UK to hack a UK originated channel is illegal.
Such mere facts as illegality have never bothered pirates.
In the last few weeks the impossible has happened. The VideoCrypt
system has been conclusively hacked. It is now possible to
purchase a pirate smart card or chip which will allow the viewer
to descramble Sky Movies Plus, The Movie Channel, Sky Gold, Sky
Sports and TV Asia. The cost of this pirate card is œ99. The price
in itself is lower than the subscription for the channels.
Other channels using the VideoCrypt system. Are worried. According
to the latest reports, The Adult Channel and JSTV have been
compromised as well. This means that all of the channels currently
using the VideoCrypt system as a fee gathering system have just
lost control of the market. It is now, well for the moment anyway.
a pirate's market.
This hack is, like all hacks, colourfully named. It is known as
the "Ho Lee Fook" hack. The joke being that this is generally the
exclamation uttered by people when told of the hack. There are two
forms of the hack; a card and a chip.
The card version of the hack is about sixteen millimetres longer
than the official BSkyB card. Essentially it is a single chip
mounted on a printed circuit board that plugs directly into the
VideoCrypt decoder's card socket. This is the more user-friendly
version as it does not require any modification to the decoder.
The chip version does require some modification to the decoder.
The official VideoCrypt name for the chip in the decoder is "The
Verifier". This chip has to be removed and replaced with the
pirate chip. The decoder will then decode the scrambled channels
without the need for the BSkyB smart card.
The pirate cards and the chips are on sale. It is believed that
a number of them are already in the UK. Indeed I received one, in
a brown paper envelope, on June the eighth. It is still working.
The problem for BSkyB and other users of the VideoCrypt system is
not one of containment. Things have progressed too far for that.
The problem is more serious. Unless they can come up with a quick
fix for the system that will render the Ho Lee Fook hack inactive,
they have to replace the smart cards.
BSkyB initially set out to replace their smart cards every three
months. This continual update was, so the theory went, meant to
deter hackers from trying to hack the system. Fiscal reality has a
crushing effect of such business school theories.
VideoCrypt suffered its first real disaster when someone
discovered that by limiting the programming voltage to the card,
it was possible to stop the card being switched off. This hack was
known as the "Infinite Lives" hack. It was an old computer term
for a modification to a games program that gave the player
unlimited lives. Since BSkyB could not turn off the cards it
seemed an apt name. This hack was followed by a new issue or batch
of cards. The "Infinite Lives" hack did not work on the new cards
but a new hack did.
The KENtucky Fried Chip upped the ante. It was the first time that
the actual internal operation of the VideoCrypt decoder was
interfered with. It was a rewritten "Verifier" chip that was
programmed to stop the cards being turned off. It did not work at
full efficiency so it was not marketed by the pirates. After this
hack, BSkyB issued a new batch of cards which was more resilient
to this hack.
The current card issue is issue 07. The Ho Lee Fook hack is
working on this batch. If BSkyB introduce issue 08 cards, then
there is the possibility of the hack ceasing to work. At this
stage there is the terrible spectre of the hack being updated to
work with the 08 cards. It is the thing of which BSkyB's
nightmares are made of.
The issue of new card batches occurs mainly in Spring or Autumn. A
Summer launch of the new 08 cards would be unusual. As VideoCrypt
will be going to a tiered channel structure in the Autumn, it
would seem that they have planned an Autumn update. The Ho Lee
Fook hack may force them to bring their plans forward by some
three months or so.
The confidence in a system is not based on how well a system
repels hacks but rather on how well a system recovers from hacks.
This will be a true test of the VideoCrypt system and its smart
card based philosophy. The philosophy is that of the detachable
secure controller. Basically what this means is that if the system
is hacked then all that needs to be done to stop the hack is to
issue a new card.
The effects on the confidence of present and prospective users of
VideoCrypt is more difficult to gauge. The smart card is the core
of the VideoCrypt system. Seeing it replaced by a pirate smart
card contradicts every claim made in favour of VideoCrypt. It was
not supposed to be possible. One thing is certain, channels will
now have to look at a scrambling system as only being a temporary
form of protection that has to be frequently updated. Failure to
do so will be fatal.
John McCormac
Author of "European Scrambling Systems 3" ISBN 1-873556-02-0
Editor of Hack Watch News.---
*** Latest ***
There is no such thing as coincidence - or is there? On the day that
the film "Sneakers" was released on video, I received an actual working
hack for the scrambled Sky channels. The film "Sneakers" is about
events surrounding a piece of equipment that can hack any cryptosystem.
The piece of equipment that I received is essentially a chip that can
hack the Sky VideoCrypt channels.
This latest hack on the VideoCrypt system has been labelled the "Ho
Lee Fook" hack. The reason for this name is more to do with people's
reaction to the hack rather than its origin, which incidentally is
Central Europe.
This is perhaps the most dangerous hack to have occurred on VideoCrypt
- it replaces the smart card. In effect it is a new smart card that
gives access to all the Sky channels. Of course the problem for Sky is
that it is not a genuine Sky card.
The card is approximately sixteen millimetres longer than the official
Sky card. It is a blue printed circuit with a single surface mount
chip, and five connector pads. The identification numbers on the chip
have been scrubbed.
The standard check for a card of this nature is to look for a wafer
from an official smart card. In the early days, a fairly common scam
was to take the chip and connector pad from a valid Sky card, trim away
the plastic and then put the chip in a DIL header. The DIL header would
then be blobbed in a lump of black resin so that it looked like an IC.
The decoder would then have its card reader replaced with an ordinary
DIL IC socket. Then the decoder and chip would be shown or sold to some
unsuspecting, if greedy, punter.
The chip appeared to be real, with no wafer underneath the body of the
chip. The actual stubs of the chip die were just visible at the end of
the chip. It was a genuine chip.
It has been working steadily for the last few days and there appears
to have been no kill messages sent to it. If it had been a direct
clone, Sky would have been able to kill it over the air - or would
they?
Since the people who developed this hack obviously understand the
operation of the over the air addressing, they may well have designed a
filter to stop the kill message from having any effect of the pirate
card. There are of course more devastating implications here. The card
itself may only contain the data and algorithms necessary to descramble
the signals.
The chip version of this hack is based on the 8752. This Ho Lee Fook
chip will replace the official 8052 in the decoder. A selling price of
ninety nine pounds has been mentioned in Germany.
Nobody is sure what the people in News Datacom are doing about this
hack. Sky are more than likely very upset that someone has hacked their
pirateproof system yet again. This is the fifth hack and the image of a
pirateproof system now only exists in the minds of PR people.
*** -=Y_HS=- all (c)'s acknowledged ***
Comments
Post a Comment