Differences between revisions 10 and 12 (spanning 2 versions)
Revision 10 as of 2008-10-22 11:55:23
Size: 2727
Revision 12 as of 2008-10-22 12:20:49
Size: 2563
Deletions are marked like this. Additions are marked like this.
Line 29: Line 29:
XXX - Add a simple example capture file to the SampleCaptures page and link from here (see below). Keep this file short, it's also a good idea to gzip it to make it even smaller, as Wireshark can open gzipped files automatically.
Line 31: Line 30:
 * [[attachment:SampleCaptures/PROTO.pcap]]  * [[attachment:SampleCaptures/SIMULCRYPT.pcap]] - Simulcrypt traffic over [TCP] on ports 8600, 8601 and 8602.

Simulcrypt (SimulCrypt)

A DVB protocol published by ETSI used in IPTV / broadcast TV head-ends to enable use of multiple key management systems. The standardised SCS (Simulcrypt Synchroniser) to ECMG (Entitlement Control Message Generator) interface is used to allow multiple key management systems to operate in parallel, each generating its own (typically proprietary) ECMs (Entitlement Control Messages).


XXX - add a brief description of PROTO history

Protocol dependencies

  • TCP: For the SCS to ECMG, SIMULCRYPT uses TCP as its transport protocol. There is no well known TCP port for SIMULCRYPT traffic as multiple TCP connections are possible (typically each TCP connection is associated to a given key management system for a particular TV channel).

Example traffic

XXX - Add example decoded traffic for this protocol here (as plain text or Wireshark screenshot).


The SIMULCRYPT dissector is fully functional for the SCS - ECMG interface. It decodes the Simulcrypt syntax to analyse different Simulcrypt messages and associated TLV parameters.

Preference Settings

(XXX add links to preference settings affecting how PROTO is dissected).

Example capture file

Display Filter

A complete list of PROTO display filter fields can be found in the display filter reference

  • Show only the PROTO based traffic:


Capture Filter

You cannot directly filter PROTO protocols while capturing. However, if you know the TCP port used (see above), you can filter on that one.

  • Capture only the PROTO traffic over the chosen port (<port>):

     tcp port <port> 


SIMULCRYPT (last edited 2010-10-05 19:07:27 by GuyHarris)