12.07.2015 Views

DCI Specs - Digital Cinema Initiatives

DCI Specs - Digital Cinema Initiatives

DCI Specs - Digital Cinema Initiatives

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FIPS 140-2 level 3 devices provide physical and logical protection of their parametersand functions 24/7 and shall be able to respond to attacks under both powered and unpoweredconditions. This means that if a type 1 SPB requires a power source toaccomplish tamper detection and response, it must zeroize its Critical SecurityParameters (CSPs) prior to any situation arising where such power source may not beavailable. By way of example, if a type 1 SPB is in storage and relying upon a battery fortamper detection and response, it must self-destruct prior to a battery depletion conditionwhich would not support proper tamper detection and/or response.”9.5.2.6. Critical Security Parameters and D-<strong>Cinema</strong> Security ParametersA requirement of FIPS-140-2 is to list the Critical Security Parameters (CSP) that areimportant for the security of <strong>Digital</strong> <strong>Cinema</strong> cryptographic module(s) (Secure ProcessingBlock) and its functions. The following CSPs shall receive Secure Processing Block(SPB) type 1 protection, whenever they exist outside of their originally encrypted state.1. Device Private Keys – RSA private key that devices use to prove their identity andfacilitate secure Transport Layer Security (TLS) communications.2. Content Encryption Keys – KDM AES keys that protect content.3. Content Integrity Keys – HMAC-SHA-1 keys that protect the integrity of compressedcontent (integrity pack check parameters).4. Control Message Encryption and Integrity Keys – AES, HMAC-SHA-1/SHA-256keys/parameters that protect the privacy and/or integrity of Composition Play Lists,Track File Lists, Key Delivery Messages and other ETMs.5. Link Encryption Keys – Keys that protect the privacy and integrity of uncompressedcontent for link encryption.6. Transport Layer Security (TLS) secrets – These are transient keys/parameters usedor generated in support of TLS and Intra-Theater Messaging (ITM). (TLS secretsassociated with the SMS end point of the SMS-SM TLS connection are notconsidered CSPs.)The following items are not considered FIPS 140-2 CSPs, but are considered D-<strong>Cinema</strong>Security Parameters, and shall at all times be protected by a type 1 SPB perimeter(except where log data is extracted per Section 9.4.6.3).1. Watermarking or Fingerprinting command and control – Any of the parameters orkeys used in a particular Forensic Marking process.2. Logged Data – All log event data and associated parameters constituting a logrecord or report.9.5.2.7. SPB Firmware ModificationsThe Limited Operational Environment operating system requirement of FIPS 140-2Section 9.5.2.5 FIPS 140-2 Requirements for Type 1 Secure Processing Blocks restrictsSPBs type 1 and the secure silicon chip of SPB type 2 from having their operatingsystem or firmware modified in the field. The following defines the requirements formaking firmware 30 changes to these security devices. FIPS 140-2 constrained devicesshall:30 The term firmware shall mean all operating system, software, firmware or ROM based code within the SPB type 1 SPBtype 2 silicon chip.<strong>DCI</strong> <strong>Digital</strong> <strong>Cinema</strong> System Specification v.1.2 Page 140

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!