[net.ham-radio] Satellite Scrambling Rumor

mbpine@drutx.UUCP (Mick Beilman) (01/17/86)

     I heard a vicious rumor today that one of the
radio channels on one of the satellite`s offered a 
$10,000.00 reward to anyone who could break the new 
Cypher-2 scrambling now in use by HBO.
     Someone has evidentially collected the money
with his version using common Radio Schaack parts 
worth only $12.00.
     Has anyone else heard this rumor?  Has anyone
have any information on how this system actually
works?

die@hydra.UUCP (Dave Emery) (01/21/86)

	HBO is using a scrambling device developed by MAccom/Linkabit
called the VideoCipher II.   It basicly denies unauthorized access to
HBO satellite feeds by digitally scrambling the audio using a DES
generated key stream, and makes watching the video more difficult by
inverting it and removing all synchronizing pulses.

		The Picture

	Recovering video from a Videocipher enciphered satellite transmission
requires little more than a source of sync genlocked to the basic horizontal
and vertical scanning rates of the HBO transmission.  As the 3.58 mhz color
burst is still present (though not at the same DC level), obtaining a
timing reference based on locking to the color burst is still quite possible.

	Once one has a source of timing (a clock slaved to the transmitter
clock) recovering correct sync phase can be handled by hand (IE push a button
or turn a knob until the picture is right) or automatically by looking for
the digital data which is substituted for the sync.

	Adding the sync to the picture and inverting the video requires
some very simple analog cicuitry.

	The job of generating sync from an oscillator slaved to the
color burst can be easily handled by one of several sync generator IC's.
The required circuitry to recover a picture from a VideoCipher II
transmission is not excessively complex and might well have been built
for a few dollars from Radio Schlock parts.

		The Problem

	This is all fine if all one wishes to see is silent movies.  But
most people want to hear the movie as well as see it.  And the sound
is transmitted under DES encryption.  There is no published method
of breaking DES.  MACom estimates that it would take "large" computational
resources "uneconomic to apply to the problem" to determine the keys
that are used that are changed tens of times a second.

	The system encodes its audio (in a 14 bit format similar to but
not identical to that used on CDs), authorization information, and
some extra bit stream capacity that may in the future be used
for delivery of data services directly to satellite equiped homes
as a 4 level pulse amplitude modulated bit stream that occupies the
time interval that the horizontal and vertical sync occupy in a standard
TV picture.

	In addition to the two stereo audio channels, this bit stream
includes authorization information addressed to a specific decoder box
that contains a 56 bit (DES remember) bit map authorizing the user to
receive one or more of 56 different service packages.  A particular show is
transmitted with a similar bit map that identifies which service 
packages it belongs in.

	The actual DES keys used to encipher the audio stream are transmitted
under a higher level key every few frames of video.  That key in turn is
transmitted under a per-show key, and that key is transmitted under a per
service key.  And the per-service key is sent to the user under a
per-user decoder box key and changed once a month or so.
So rather than have one fixed key that enciphers the
whole bit stream for hours or days at a time, the actual keys that are
used to encipher repetitive patterned data such as the sound are randomly
chosen and frequently changed.

	Macom keeps the keys secure by building the entire decrypting
process into one large VLSI chip which never puts out a key on any
of it's pins.  So obtaining the keys requires microprobing the chip
(which clever metalization may well make impossible).  Interestingly,
they recognized the problems that could be caused by theft of a list
of decoder box keys, so each decoder box has a number of different
individual keys burned into it so that if one list is lost, they can
simply switch to another.

 
		The Result

	It seems inconceivable to me that anyone has broken an
apparently well thought out DES based audio encryption system with
$12 of Radio Shack parts.  I have never heard any information that
would suggest that HBO built in a back door method of recovering audio
such as an analog modulated subcarrier (similar to the normal method
of transmitting audio on a satellite) so I suspect that all the
person involved did was recover a watchable picture without sound
which isn't very hard to do and is clearly not worth $10000.


		VideoCipher I

	Originally MAcom developed the Videocipher I which was a
substantially more complex and expensive device intended for use
only by cable companies.  It used DES psuedo-random address sequences
to read individual chunks of video (portions of a line) out of 
a digital frame store.  When it became obvious that a device was needed
that could be sold to home viewers for a reasonable amount of money
and work well with poor downlink receivers and poor signals it became
clear that the VideoCipher I was excessive.

	The VideoCipher I has been revived, however, to encipher CBS
backhauls from remote studios and sports events back to CBS headquarters.
I understand that CBS feels that other networks were pirating news stories
by watching CBS feeds.  I have not heard whether they intend to encipher
all the feeds to their stations, but I doubt very much if they will get
away with denying rural areas access to CBS programming so they will no
doubt keep one open.  


		B-MAC

	The other satellite TV scrambling system currently being marketed
aggressively is B-MAC sold by Scientific Atlanta which also uses DES encoded
audio (or something similar to DES).  It, however, also uses DES to dither
(delay by psuedo-random amount) the video and does not transmit the
video in a normal NTSC format (rather it transmits the luma and
two color components as separate pulses at a substantially higher
effective scan rate and uses CCD or digital line store devices
to combine them back into a NTSC color picture).  As a result, B-MAC
encoded video is much much harder to recover a watchable picture from.

	B-MAC is scheduled to be used to encode the Holiday Inn Hi-Net
6 channel Ku band movie service (one channel of which may be HBO).  Scientific
Atlanta would love to be able to sell their scrambling system to
the C-band cable system signal providers but MAcom got a head start with
HBO and is strenuously arguing that TVRO users don't want to have
to buy two $300 descrambler boxes.  However the fact that the video
isn't very secure with the MAcom system has been an issue and that
may be why there has been some publicity about the subject.


		The MDS Loophole

	HBO transmits unenciphered video on so called multipoint
distribution systems (2150 mhz) in more than 300 different metropoliten
areas throughout the country.  The modulation used is standard vestigal
sideband AM with FM sound.  All that is required to pirate HBO from
such signals is a downconverter than converts the 2.15 GHZ to channel
3.  Such downconverters used to be quite widely advertised for
"Ham-TV" because a radio amateur band is nearby (2304 mhz).

	Reception of MDS signals for the purpose of illegally obtaining HBO
service has been found to be a violation of the Communications Act of 1934 in
a recent Supreme Court decision.  And of course the infamous "Electronic
Communications Privacy Act of 1986" which is moving through congress
may make any reception whatsoever of unauthorized signals whether out of idle
curiosity or fraudulent intent a serious federal felony equivalent to
the present crime of wiretapping.

	It is however amusing to note that 3 different networks I watched
on the night HBO started full time scrambling all showed pictures of
MDS antennas along with regular satellite dishes.  The voice over
said nothing about MDS but the tape clearly showed pictures of MDS
antennas on all the network stories I watched.  I suspect this was 
a quite and clever comment by the technical folk who shot the tape
about the MDS loophole, as I doubt there are many broadcast technicians
who can't tell the difference between an MDS antenna and a satellite
dish.

	In any case it is probably true that nearly as many if not
more people pirate HBO from MDS links with equipment that sold for
as little as $59 as those who used $3000 home TVRO's principly to
cheat HBO of it's monthly subscription fee.


          David I. Emery    Charles River Data Systems   617-626-1102
          983 Concord St., Framingham, MA 01701.
	  uucp: decvax!frog!die

dsi@unccvax.UUCP (01/22/86)

> 
> 	HBO is using a scrambling device developed by MAccom/Linkabit
> called the VideoCipher II.   It basicly denies unauthorized access to
> HBO satellite feeds by digitally scrambling the audio using a DES
> generated key stream, and makes watching the video more difficult by
> inverting it and removing all synchronizing pulses.

     'Tis true... Our VideoCipher II just came in yesterday, and I might
just add that it is a very sophisticated piece of equipment.

     First, the VideoCipher II is available in two models for "consumer"
use: one, which accepts raw (nondeephasized video) or composite video, and
the other, which allows looping through the 70 mHz IF signal from the
satellite receiver.  The version I had was the "looped through" version;
both the consumer/SMATV versions have an RF modulator for channel 3 or 4.
I believe that a wireless remote is available.

      However, the person who is selling me my AUTHORIZED FOR HBO VideoCipher
box (no flames) had it at home preauthorized, working fine, but when we
connected it to our antenna last night, it wouldn't work.  The help menu
wouldn't come up or *nuthin'*.  The VideoCipher box does depend on the
reception of a VideoCipher-encoded audio data stream before the functions
on the front panel would work; it may be that the Sat-Tec receiver we were
using was too "narrow" to recover the audio clock and data properly from
the synchronizing interval.

      That's where it was left, last night.  We are dropping back to punt,
and when I get the SA 6603 receiver on the dish (and verification that the
box is authorized) I'll post observations about the VideoCipher box to the
net.

David Anthony
DataSpan, Inc

mikey@techsup (01/25/86)

  The video portion is easy to bust, the sound is the problem.  
At least, that's what I've been told, I wouldn't know from personal
experience!

mikey