Table of Contents

 1     Scope            
        1.1     Purpose              
        1.2     Reference architecture    
 2     References   
 3     Definitions   
        3.1     Terms defined elsewhere
        3.2     Terms defined in this Recommendation     
 4     Abbreviations and acronyms  
 5     Conventions
 6     Architectural requirements       
        6.1     CRS headend   
        6.2     CRS STB           
 7     Functional requirements           
        7.1     Authentication and secure download of CACS         
        7.2     CAM and descrambler pairing      
        7.3     Countermeasure to CAM cloning attacks  
 8     Security Requirements              
        8.1     CACS encryption key establishment           
        8.2     Operational encryption key enforcement   
Appendix I – Overall CRS operation flows    
Bibliography