SHAPING THE FUTURE SATELLITE OF COMMUNICATIONS
8.2 BISS ................................................................................................................81
8.2.1 Overview ......................................................................................................81
8.2.2 Security Approach .......................................................................................82
8.2.3 Modes of Operation .....................................................................................82
8.3 AES Content Protection ..................................................................................84
8.3.1 Content Protection .......................................................................................85
8.3.2 Key Management .........................................................................................85
8.3.3 Operation of AES .........................................................................................90
8.3.4 Generating Encrypted Content Keys ...........................................................93
8.4 ASI Test Generator .........................................................................................96
8.5 Equalink ..........................................................................................................97
Appendix A – Setup Wizard ..................................................................................98
Appendix B – User Defined Menu ......................................................................101
Appendix C – Technical Specifications .............................................................102
Appendix D – Details GR-01 and GR-02 ............................................................106
Appendix E – List of Weak 64-Bit Group Keys .................................................107
Appendix F – Abbreviations ...............................................................................108