摘要

This paper analyses the host authentication mechanism in the current POD (point-of-deployment) Copy Protection System. At first, the re-authentication procedure can not stand out a simple replay attack. Secondly, the host authentication protocol makes a DH (Diffie-Hellman) private key in any run as significant as a device private key. At last, the credentials of the POD module are futile. The result urges a technical improvement of the current host authentication mechanism(1).

全文