Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption and Digital Rights Management

Similar presentations


Presentation on theme: "Encryption and Digital Rights Management"— Presentation transcript:

1 Encryption and Digital Rights Management
A look at encryption technologies and their role in protecting intellectual property rights in the digital age.

2 We will be examining Copyrights Audio DRM Video DRM FairPlay DVD/CSS
Blu Ray/ AACS (BD+)

3 Digital Rights Management
Control access to protected material Video Audio E-Book Video Games

4 Whose rights? Copyright Protection
Protection of original works in a tangible medium of expression Protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture. Do you need to register a copyright? Source - U.S. Copyright Office

5 Whose rights? Copyright vs. copyleft GNU-GPL
What is your boss going to prefer?

6 Cassette Tapes Early scourge of recording industry Mix Tapes WUEC

7 Cassette Tapes

8 Digital Audio DRM - Fairplay
Apple Computer DRM system AES encryption Master key stored on Apple server User key stored encrypted are in iTunes

9 Machine Authorization

10 Key Exchange When a user buys a song from the iTunes Store, a user key is created for the purchased file. The AAC song itself is scrambled using a separate master key, which is then included into the protected AAC song file. The master key is locked using the user key, which is both held by iTunes and also sent to Apple’s servers.

11 Playing a protected song
iTunes uses the matching user key to unlock the master key stored within the song file. Keys are all encrypted and stored on the authorized iTunes computer, as well as being copied to Apple's servers. When a new computer is authorized, it also generates a globally unique ID number for itself and sends it to Apple. Apple's server sends the newly authorized machine the entire set of user keys for all the tracks purchased under the account. 

12 Playing on an iPod All keys are downloaded to iPod.
Protected songs which do not have keys are not able to be copied to iPod.

13 Cracking FairPlay – Jon Johansen
Song data dumped as a raw stream into a large container file, requiring further processing afterward.  PlayFair, Hymn, JHymn and other derivatives-- intercepts unlocked but not yet uncompressed song files, creating a small, ready to play, unencrypted AAC file. PyMusique, requests songs from Apple's servers and then downloads the purchased songs without locking them, as iTunes would. FairKeys pretends to be iTunes; it requests a user's keys from Apple's servers and then uses these keys to unlock existing purchased songs. Not fully cracked

14 Digital Audio DRM – Yahoo!
What happens when DRM servers go offline?

15 Early Video DRM - Macrovision
Used to protect VHS from recorder-recorder copying Exploits VCR gain control Mechanical work-around VCR-VCR

16 CSS – Content Scramble System
Keys stored on lead-in areas of disc Prevents byte-for-byte copies Requires manufacturers to obtain license Keys for EVERY licensed player encrypted on DVD 40 bit cipher stream Government forbade export of >40 bit ciphers Compromised by brute force attack

17 DVD Encryption Keys

18 Linear Feedback Shift Registers
Every eight clock cycles, byte is produced.

19 DeCSS Linux Haiku describing decryption algorithm
CSS cracked by Jon Lech Johansen and two others in 1999 A computer fast enough to play a DVD was fast enough to decrypt CSS in real time. Haiku describing decryption algorithm

20 Code fragment of DeCSS.

21 ARccOS DRM protection Advanced Regional Copy Control Operating Solution Proprietary system by the Sony Corporation Added corrupt sectors which DVD players were instructed to skip Some Sony movies were unplayable even on Sony players without firmware update

22 Blu Ray Encryption AACS BD+ - helped win format war.

23 Advanced Access Content System

24 AACS Key Controversy 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
Copyrighted 128 bit number! Take down notices sent by Motion Picture Association of America and AACS Licensing Agent May 1st, 2007: Google search for key: 9410 results May 2nd, 2007: Over 300,000 Playback devices hold binary tree of possible keys. When key is compromised, new discs choose different key.

25 BD+ Works “on top” of AACS
Virtual machine embedded in authorized player Examine the host environment, to see if the player has been tampered with. Verify that the player's keys have not been changed. Execute native code, possibly to patch an otherwise insecure system. Transform the audio and video output. Limit playback of a Blu-Ray disc to the first device in which the disc is played

26 Slysoft vs. BDA/Macrovision
About a three month window between new BD+ and Slysoft’s AnyDVD cracking it. Win for studio.

27 Analog Hole Always possible to pass digital content through analog device to copy

28


Download ppt "Encryption and Digital Rights Management"

Similar presentations


Ads by Google