Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.

Slides:



Advertisements
Similar presentations
© 2003 Verance Corporation. 1 Verance Copy Management System Presentation to CPTWG ARDG April 10, 2003.
Advertisements

T O P I C ST O P I C S Uses of Technical Measures Case Studies and Types of Technical Measures The Problem of Hacking and Circumvention Online Music Distribution.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Data Encryption Standard (DES)
Payment Systems 1. Electronic Payment Schemes Schemes for electronic payment are multi-party protocols Payment instrument modeled by electronic coin that.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Broadcast Encryption and Traitor Tracing Jin Kim.
1 Florian Pestoni IBM Research IBM xCP Cluster Protocol IBM Presentation to Copy Protection Technical Working Group July 18 th, 2002.
Copyright Law Boston College Law School March 13, 2003 Rights - Digital Rights.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Cryptography Week-6.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Cryptography, Authentication and Digital Signatures
Certification asynchrone à grande échelle avec des arbres de vérification de certificats Josep Domingo-Ferrer Universitat Rovira i Virgili
SmartRight™ 1 THOMSON multimedia 2001 ©11 july 2001 Copy Protection System for Digital Home Networks CPTWG – July 11, 2001.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Dong Hoon Lee CIST Korea University Efficient Communication-Storage Tradeoffs for Broadcast Encryption Schemes ( will be published.
Korea University CRYPTO ‘05 Jung Yeon Hwang, Dong Hoon Lee, Jong In Lim Generic Transformation for Scalable Broadcast Encryption Schemes.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
ASYNCHRONOUS LARGE-SCALE CERTIFICATION BASED ON CERTIFICATE VERIFICATION TREES Josep Domingo-Ferrer, Marc Alba and Francesc Sebé Dept. of Computer Engineering.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
UDAC( Universal Distribution with Access Control ) 99/05/03All Rights Reserved, Copyright (c) FUJITSU LIMITED UDAC IPR (Intellectual Property Rights)
The DMCA, DeCSS, Copyrights and the First Amendment.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Fall 2006CS 395: Computer Security1 Key Management.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Security of Broadcast Networks 1. Overview r Broadcast networks are used mostly for TV r Historical development r Commercial models r One-way or Two-way.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
A Signature-like Primitive for Broadcast-encryption- based Systems Jeffrey Lotspiech IBM Almaden Research Center.
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
Assignment #5 – Solutions
SPE Expectations Leverage existing delivery technologies
Content protection for 4k
Protect Your Hardware from Hacking and Theft
4K Content protection overview
4K Content protection overview
Presentation transcript:

Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center

Why content protection? Shift from physical to digital distribution Content is licensed, not sold Digital content resides in potentially “hostile” environment

Can copyright infringement be prevented? It can be discouraged –Self enforcement –Inconvenience Infringers can be prosecuted $5 lock protects $1000’s of property No No, but…

It is Not About the Cryptography... Thought experiment: –Movies'R'us.com has just invented a novel compression technique for video –They get a strong patent on the technique –They license the technique for prerecorded DVDs, and require players to verify usage rights –Finally, they give the studios "third party beneficiary rights" which gives them status in court to sue infringers A complete, logical, copy protection scheme … it’s about the license

Global secret schemes Once broken, all content is exposed to everyone at once Weakness in: –Thought experiment just described –CSS (DVD)

CPRM Jointly developed by “4C”: –IBM, Intel, Matsushita and Toshiba Currently announced for: –Secure Digital (SD) card, DVD-RAM/R/RW … and its cousin CPPM –DVD-Audio

Goals Protect stored content from simple replication Trace and revoke non-compliant devices –Renewable security Survive multiple “hacking events” Practical –Storage –Processing

Algorithmic lineage Broadcast encryption –Fiat and Naor, Crypto ’93 Tracing traitors –Chor et al., Crypto ‘94

Elements of CPRM C2 Symmetric cryptosystem –Efficient implementation in hardware Media Key Blocks –MKBs are recorded on the media Device Keys –Are stored at the players

Licensing All elements must be licensed from licensing center (License Management International, LLC) –C2 “S-boxes” To implement compliant players –MKBs To CPRM-enable media –Device keys To be able to play and record CPRM-protected content Small fees associated with the keys and MKBs

CPRM at work Device Keys Media Key Block ID media E Kmu (Kt ) E Kt (content) Process MKB Km Media key Kmu Media Unique key One-wayDecrypt Kt Title key Decrypt Content

Device Keys A scheme consists of a large matrix of random keys –K i, j where 0  i < R, 0  j < C Each device is assigned C keys –each Kd j where 0  j < C corresponds to a key from column j in the scheme matrix Device keys must be stored “securely” on each device

E Ki,j (Km) Media Key Blocks A Media Key Block is a data structure that contains multiple ciphers of the same media key Km under different device keys Kd E Ki,j (Km) Device A Device B

Revocation To revoke Device B, an MKB is written that has invalid keys in all the positions corresponding to the keys assigned to B E Ki,j (Km) Device A Device B

Threat model I Over time, keys will be leaked: –Reverse engineering –“Sloppy” or “evil” licensees Solution: –Disable compromised keys –Prevent “cloned” devices from playing new content Limitation: –As the number of revocations grows, the probability that compliant devices will be disabled increases

Threat model II Save/restore attack: –Bit-by-bit copy of media contents –Delete (e.g. SDMI checkout) –Restore media image Solution: –Dynamic media id (used to compute Kmu) is incremented after every secure delete Limitation: –Must re-encrypt all title keys with the new Kmu

Tracing If a cloned device is “captured,” custom MKBs are created to trace the compromised device keys: –For each column, write garbage in the top half and real keys in the bottom half –If the player cannot decrypt, write good keys in the top quarter and garbage in the rest –Otherwise, continue binary search in “good” section until it is pinned down –Proceed to the next column

Call to action In the interest of copyright owners, we are making circumvention “inconvenient” But we need to make the usage of copyrighted content more convenient for consumers