DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
ASYMMETRIC CIPHERS.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Database Key Management CSCI 5857: Encoding and Encryption.
Public Key Model 8. Cryptography part 2.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Donald M. Whiteside Vice President, Corporate Technology Group Director, Technical Policy and Standards ITU and EBU Presentation A perspective on trends.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
ENHANCED CONTENT PROTECTION OVERVIEW. Security Solution Characteristics Comprehensive security ecosystem All devices meet the same standard – No assumption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography, Authentication and Digital Signatures
1 Today’s topics Security –Demo from RSA Security ( –Slides taken from Kevin Wayne & Robert Sedgewick at Princeton University –For further.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
1 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Upper OSI Layers Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
Intro to Cryptography Lesson Introduction
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
Private key
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
Security of Digital Signatures
Digital Rights Management (DRM)
Security through Encryption
4K Content protection overview
NET 311 Information Security
Outline Using cryptography in networks IPSec SSL and TLS.
4K Content protection overview
Encryption and Digital Rights Management
TPM, UEFI, Trusted Boot, Secure Boot
Basic Network Encryption
Basic of Modern Cryptography
Hashing Hash are the auxiliary values that are used in cryptography.
Presentation transcript:

DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005

Outline Trends in technology of copying Goals of DRM Security basics Three DRM technologies Questions

Trends in technology of copying Kucher et al., Self-Protecting Digital Content

Goals of DRM Problem: Anything that can be done to bits, can be done by a general-purpose computer Some people want to give you bits, but want to prevent you from doing certain things with them: –Redistribution –Public performance –Derivative works –Permanent storage –… (Call these restrictions the policy.) The DRM Dream: make it “hard enough” for users to violate policy without permission

Security basics DRM is a security measure (it protects the confidentiality and integrity of certain data) “Security” is not a binary property; it can only be measured in terms of tradeoffs and costs in a particular context: Q1. What is the the resource being protected, and how much is it worth? Q2. What are the expected attacks? Q3. How well do the available security measures stand up against these attacks? Q4. What is the cost of these measures?

A short detour into cryptography Encryption Digital signatures Watermarks

Encryption Symmetric: Public-key: +) encryption decryption + + encryptiondecryption + Public key Private key ) ) )

Digital signatures + signing Private key Public key + X OK verification +) ) ) + X ) a a a a b

Watermarks +ID ) watermarking detection ) ) ) )

DRM as a security problem Q1: What is the resource being protected, and how much is it worth?

DRM as a security problem Q2: What are the expected attacks? Brute-force decryption Analog capture Software: –Key recovery –Plaintext memory read Hardware: –Key recovery or plaintext capture

Attacks in detail Brute-force decryption –Attack cryptographic algorithm directly to recover plaintext –Infeasible for well-designed cryptosystems Analog capture –Render into human-consumable form using provided mechanisms, and capture using other equipment –Always feasible –May be inconvenient, and result in minor loss of quality, metadata, or features

Attacks in detail (2) Software: key recovery or plaintext memory read –Systems usually require that unencrypted keys and/or plaintext be transmitted and/or reside in memory Cory Doctorow: “Alice has to provide Bob --- the attacker --- with the key, the cipher, and the ciphertext. Hilarity ensues.” –In most computers, always possible to inspect any location in memory –Hence, user can, in principle, always circumvent software-only DRM solutions by this attack

Attacks in detail (3) Hardware attacks: –To defeat software attacks, some functions can be “locked up” in hardware –Hardware is harder for user to inspect/modify than software –If hardware is designed naively, user can probe hardware to extract keys or plaintext, or “trick” hardware into doing things it should not

Constructing DRM systems Q3. How well do the available security measures stand up against these attacks? Consider 3 example systems: FairPlay Content Scrambling System Self-Protecting Digital Content

FairPlay (Apple iTunes) Policy: user may –Copy tracks to any iPod or burn to any CD –Play tracks on 5 computers –Burn playlist to CD up to 7 times without changing the playlist + ) Track master key Encrypted track Plaintext music file + User key iTunes server user Track master key ) Encrypted master key +) + ) iTunes client software Client machine OS sound driver Sound card Speakers

Content Scrambling System (DVDs) Policy: user may decrypt content on licensed device Architecture: DVD data divided into “titles” Each title encrypted with a title key Each title key encrypted with a disc key, and placed on disc Disc key copied 409 times, each encrypted with a different one of the 409 player keys, and all encrypted copies placed on disc One or more player keys distributed to each licensed device manufacturer +) … +) … … ) DVD DVD drive DVD producer Title keysTitles Disc keyTitle keys Player keys Disc key copies

Attacks on CSS Key recovery attack: –Can compromise one player, get the key, and decrypt all DVDs –“Break Once, Break Everywhere” (BOBE) Memory attack: –DVD-ROMs are attached to general-purpose computers; can read video out of memory buffer during playback Analog attack –With appropriate adapters, can plug video out into VCR. Note: CSS doesn’t really prevent copying anyway; DVD ciphertext can be copied without ever decrypting contents.

Self-Protecting Digital Content [Kucher et al.]

SPDC: End-to-end security

SPDC: Attacks Safe from software key recovery and memory read attacks: –key and plaintext never leave secure environment on chip, and so never appear in memory accessible to general-purpose computer Hardware attacks: –Can build (imperfectly) tamper-resistant hardware –Even if attack succeeds, may compromise existing content only; future content uses different encryption schemes –Can add more features for extra security e.g., require content to “phone home” over net to authenticate that hardware/software environment has not been compromised Analog attack: can put a camcorder in front of the monitor

Aside: a note on watermarks Watermarking can be applied to content independently of other DRM schemes Watermarks can usually be erased by clever users or clever software Still, some users are too dumb to use clever software, so watermarks may yield some forensic benefits

DRM as a security problem Q4: What are the costs of these security measures? …for content producers? …for device manufacturers? …for technical innovators? …for honest consumers?

Questions Given the prerequisites for a SPDC system, is there a path to probable market acceptance of strong DRM? What is the real effect/value of weak DRM? Are there restriction policies that users of e- books might consider “reasonable”? –Consumers? –Scholarly users? –Public libraries? –Users with accessibility needs? –Hackers?