1 SCOPE
2 REFERENCES
3 TERMS AND DEFINITIONS
4 ABBREVIATIONS AND ACRONYMS
5 OVERVIEW
6 ENCRYPTED DOCSIS MAC FRAME FORMATS
7 BASELINE PRIVACY KEY MANAGEMENT (BPKM) PROTOCOL
8 EARLY AUTHENTICATION AND ENCRYPTION (EAE)
9 SECURE PROVISIONING
10 USING CRYPTOGRAPHIC KEYS
11 CRYPTOGRAPHIC METHODS
12 PHYSICAL PROTECTION OF KEYS IN THE CM
13 BPI+ X.509 CERTIFICATE PROFILE AND MANAGEMENT
14 SECURE SOFTWARE DOWNLOAD
ANNEX A - TFTP CONFIGURATION FILE EXTENSIONS (NORMATIVE)
ANNEX B - TFTP OPTIONS (NORMATIVE)
ANNEX C - DOCSIS 1.1/2.0 DYNAMIC SECURITY ASSOCIATIONS
(NORMATIVE)
ANNEX D - BPI/BPI+ INTEROPERABILITY (NORMATIVE)
APPENDIX I - EXAMPLE MESSAGES, CERTIFICATES, PDUS AND CODE
FILE (INFORMATIVE)
APPENDIX II - EXAMPLE OF MULTILINEAR MODULAR HASH (MMH) ALGORITHM
IMPLEMENTATION (INFORMATIVE)
APPENDIX III - CERTIFICATE AUTHORITY & PROVISIONING GUIDELINES
(INFORMATIVE)