SHAPING THE FUTURE SATELLITE OF COMMUNICATIONS
Group Key: d9d47fae81fad3154384d79cf1278306
Encrypted Content Key: be9c253b8e707ee851ba5ce6dd388753
Example 2:
Content Key: 1234567890abcdef1234567890abcdef
Group Key: d9d47fae81fad3154384d79cf1278306
Encrypted Content Key: d52e1da09a29691f85f9d5da74e07bed
Example 3:
Content Key: 1234567890abcdef1234567890abcdef
Group Key: 06450f0aaa9b9655ee9c4073097c7b08
Encrypted Content Key: 9df1586017ee2b0417eebf86ac6d4627
8.3.4.2 64-bit Keys
A similar process is used for the computation of encrypted content keys in the 64-
bit mode. The computation of the encrypted content key from a given content key
is depicted in the following figure.
Figure 52 - Process to Encrypt a Content Key with a Specific Group Key in 64-bit Mode
The DES algorithm used is the one described in the FIPS-46-3 standard from the
NIST.
The following lines provide a few examples of key computations for reference:
Example 1:
Content Key: 278da56a0f06aa1f
Group Key: fb5f9c585dd359aa