User guide
6-16
Miscellaneous
Figure 6-7: The keys and where they are used on the Recipient side
At the Recipient the received DCP has to be validated with the help of
the public Signing Key that is attached to each extra file of the DCP
(e.g. CPL, KDM or PKL). Whether the track files were received unmod-
ified can be checked by comparing the hash values written in the vali-
dated (and thus unaltered) PKL file with hashs calculated from the
received track files. The completely validated DCP can then be played
out by decrypting the AES keys with the private key of the Encryption
key. After this the AES keys will be used to decrypt the track files of the
DCP.
6.6.5 What’s a Certificate Chain
Certificates (see section “What’s a Certificate”) can be distributed in a
chain, where the last certificate (the leaf certificate that cannot create