Methods and apparatus are disclosed for a content encryption scheme using
programmable hardware. In one embodiment, a content request is
transmitted to a content provider. In response to the content request, a
session key is received and programmable hardware is configured using the
session key to produce a first configuration. An identification key is
generated and the first configuration of the programmable hardware is
used to encrypt the identification key. The encrypted identification key
is transmitted to the content provider. Encrypted content containing the
identification key is then received.