CONTENTS

 1     Scope
 2     Informative reference
 3     Definitions
 4     Abbreviations
 5     Security requirements
 6     Modes of operation
 7     Mode 0
 8     BISS Mode 1 – Functional requirements
        8.1     Overview
        8.2     CA_descriptor
 9     BISS Mode E – Functional requirements
        9.1     Clear Session Word
        9.2     Encrypted Session Word
        9.3     Decryption scheme
                  9.3.1     Overview
                  9.3.2     Unit identifiers
                  9.3.3     Decryption function
                  9.3.4     Post-processing function