ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A STUDY OF KEY MANAGEMENT FOR CONDITIONAL ACCESS SYSTEMS

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.9, No. 4)

Publication Date:

Authors : ;

Page : 1781-1789

Keywords : Key Management; Conditional; Access Systems;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The research begins off with a breakdown of the basics of CAS and the value of key management. The advantages and disadvantages of various management structures are then discussed. The study also discusses the several types of keys used in CAS, including the content key, control word, and session key. It explains how these keys are generated, propagated, and revoked, and it details the many protocols that are used for these tasks. Before a key's expiration date, it's crucial to revoke it. Others have proposed a concept for automated key revocation based on an estimated key's remaining useful life. By reviewing the existing literature on the topic of key revocation, it was found that the proposed key revocation model performed better than its predecessors. Using the proposed key revocation paradigm, it is possible to successfully revoke cryptographic keys.

Last modified: 2023-05-04 15:23:49