DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.

Slides:



Advertisements
Similar presentations
1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.
Advertisements

Packaging a Presentation on a CD, using PowerPoint 2003 Multimedia Services at The Citadel Updated
Content Scramble System for DVD PeiXian Yan,Bo Zhou,Gang Liu, ZongPeng Liu, Matthew Black December 6,2004 Supervised by Andy Brown.
1 Copyright Protection Lecture 1:Watermarking and Fingerprinting (passive copyright protection) Lecture 2:Tracing and Revoking pirates. (copyright protection.
Why the DMCA has the right to outlaw numbers
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Computer Concepts 2013 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
Software Infrastructure for Electronic Commerce All About Cryptography Professor Fred B. Schneider Dept. of Computer Science Cornell University.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Chapter 14 Recording and Editing Sound. Getting Started FAQs: − How does audio capability enhance my PC? − How does your PC record, store, and play digital.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
C opyright Protection and Digital Rights Management 1.
Windows Media DRM Device Porting Kit Review Scott Plette Program Manager Media Technology Group microsoft.com Microsoft Corporation.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
CPTWG Jan MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002.
Chapter 8: Digital Media1 Digital Media Chapter 8.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Media Server Streaming Elizabeth Canela David Vera Bernard James Lilian Ohanian.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Computer Main Parts By: Yeimy Monterrosa Salazar Teacher: Bertha Inés Ramírez Osorio Cesde 2015.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Newsfeeds Tutorial.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
BDA UHD Format Study (SPE internal update)
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Data Encryption Chris Mraovich. Overview Purpose of EncryptionPurpose of Encryption Permutations Bases and FactoradicsPermutations Bases and Factoradics.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Chapter 15 Recording and Editing Sound. 2Practical PC 5 th Edition Chapter 15 Getting Started In this Chapter, you will learn: − How sound capability.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Network Security David Lazăr.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Inserting CD Audio Tracks Inserting Audio Tracks From Media Player Inserting Movies Creating a Thumbnail Gallery Welcome to Advanced Power Point Inserting.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
®® Microsoft Windows 7 Windows Tutorial 7 Managing Multimedia Files.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
A Signature-like Primitive for Broadcast-encryption- based Systems Jeffrey Lotspiech IBM Almaden Research Center.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
Content Scramble System for DVD
Content protection for 4k
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Digital Rights Management Market.
Digital Rights Management (DRM)
Encryption and Digital Rights Management
Presentation transcript:

DRM & Key Revocation By David Coleman

DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation – The ability for content producers to “revoke” the ability of a given device/player to consume the content ► Important because…  Digital content can be perfectly reproduced  CD Audio was a disaster from music studios’ perspective (the need for DRM)  DVD-Video wasn’t much better (the need for good DRM) ► I’ll be discussing 3 systems: CSS (DVD-Video), Microsoft Windows Media DRM, and AACS

DRM & Key Revocation Content Scramble System (CSS) ► Used on DVD-Video discs ► 40-bit keys using a secret encryption algorithm (2 LFSRs) ► Keys  Disc key – Key that allows (indirectly) decrypting the content  Player key – Key that allows player to decrypt disc key  400+ player keys ► Key block  Disc key hashed with CSS hashing algorithm  Table containing disc key encrypted with all valid player keys  Player would decrypt the disc key and then hash it to compare against hashed value ► Revocation  Removing the player key from the key block ► Completely broken  Player key recovered from Xing software player  Remaining player keys were poorly chosen and quickly guessed  Encryption was very weak anyway (a few discrepencies allowed for an O(25) attack)

DRM & Key Revocation Microsoft Windows Media DRM ► My motivation for this topic ► Widely used in online music services (not Apple) ► Basics  StubLib – Certificate that is statically linked in to player  Encrypted content file  License – Contains key to decrypt the content file. Encrypted with player’s public key (from StubLib).

DRM & Key Revocation Microsoft Windows Media DRM License acquisition

DRM & Key Revocation Microsoft Windows Media DRM ► Revocation  Certificate Revocation List (CRL)  Microsoft maintains the CRL and license servers are expected to pull and keep local copy current  CRL is included in the license  Works because API to play is a black box

DRM & Key Revocation Advanced Access Control System (AACS) ► Used on next generation DVD (blue laser) ► Strong encryption based on published standards (AES-128, SHA-1, etc.) ► Certificates  Not X.509  Each player & drive have a certificate ► Keys  Media key – necessary to decrypt content  Device keys ► Each device given a set of keys ► Sets overlap, but no two devices have the identical set ► NNL Key Management ► Keys actually organized in a binary tree where child keys of a node can be computed via a one-way function

DRM & Key Revocation AACS ► Revocation  Two methods  CRL ► Every disc has a player CRL and a drive CRL ► CRLs must be stored after reading  Player key revocation ► Media key is encrypted with the minimal set of keys s.t. no revoked device’s key is used but one of every valid device’s key is used ► Subset-difference ► Tree structure helps

DRM & Key Revocation Questions?