1
Scope
1.1
Purpose
1.2
Reference architecture
2
References
3
Definitions
3.1
Terms defined elsewhere
3.2
Terms defined in this Recommendation
4
Abbreviations and acronyms
5
Conventions
6
Architectural requirements
6.1
CRS headend
6.2
CRS STB
7
Functional requirements
7.1
Authentication and secure download of CACS
7.2
CAM and descrambler pairing
7.3
Countermeasure to CAM cloning attacks
8
Security Requirements
8.1
CACS encryption key establishment
8.2
Operational encryption key enforcement
Appendix I – Overall CRS operation flows
Bibliography