Encryption and Digital Rights Management

Slides:



Advertisements
Similar presentations
1 G CARD Lock your data in memory card. The key to unlock your data is your memory card. Cross Platform for your security solution 8/25/2011.
Advertisements

Developing the Digital Market October 23, 2006 Mitch Singer EVP Technology and New Media Sony Pictures Entertainment.
1 Downloadable Music Industry Ryan Herring Jinghua Luo Kevin Mack Shahram Rezaei.
Pro Tools 7 Session Secrets Chapter 6: After the Bounce or Life Outside of Pro Tools Life Outside of Pro Tools.
Why the DMCA has the right to outlaw numbers
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
1 Windows Media Rights Manager and FairPlay Seminar Digital Rights Management Clara Fernández de Castro.
Peter D. Aufrichtig, Esq..  Intellectual Property clients look and sound like all other clients.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Digital Rights Management Bill Cody – MSIT-526 – 12/20/05.
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
Chapter 14 Recording and Editing Sound. Getting Started FAQs: − How does audio capability enhance my PC? − How does your PC record, store, and play digital.
Digital Rights Management Brian P. Bailey Spring 2006.
C opyright Protection and Digital Rights Management 1.
                      Digital Video 1.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Macrovision Corp. November 18, 2004 David Mizell Mary Voss Wei Wang.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
BDA UHD Format Study (SPE internal update)
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Copyright Laws & Regulations Created by The University of North Texas in partnership with the Texas Education Agency.
Chapter 15 Recording and Editing Sound. 2Practical PC 5 th Edition Chapter 15 Getting Started In this Chapter, you will learn: − How sound capability.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Copyright Laws & Regulations. Copyright © Texas Education Agency, All rights reserved. 22 A.Title 17 of U. S. Code 1. Protection provided by law.
The DMCA, DeCSS, Copyrights and the First Amendment.
Is It Stealing? By Amber Porter. Key Terms  Software licensing- Allowing an individual or group to use a piece of software  Piracy- The unauthorized.
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
COPYRIGHT TERMS BROADCAST LAW. AUTHOR/ARTIST The creator of a work.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Digital Rights Management (DRM) Kamil Kaminski. Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption:  AACS (Advanced Access Content.
What is DRM? Digital Rights Management is: –From Richard Stallman, President of the FSF: ”The motive for DRM schemes is to increase profits for those.
How to Convert/Transfer iTunes to Sony Walkman through Mac/Windows? All rights reserved— I got my kids.
Copyright Laws & Regulations
© 2016 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
Chapter 15 Recording and Editing Sound
Content Scramble System for DVD
How to remove DRM protection from your iTunes movie Firstly, it is important for you to know more about what exactly is DRM. DRM refers to Digital Rights.
Top 3 Best Cinavia Removal Software
3 Best Blu-ray Copy Software to Copy Blu-ray
New Beyonce Album $10.99.
You will be given the answer. You must give the correct question.
What is Copyright?.
Technology Literacy Hardware.
Copyright What we need to know. ©
4k Content Delivery Sony Pictures Technologies.
Sony Pictures Technologies
Applying Digital Watermarking Technology to Control CD copying
Digital Rights Management
Content protection for 4k
4k Discussion Sony Pictures.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Digital Rights Management Market.
By Jake Schmitt, Seth Raleigh, Neil McLain
Fair Use of videos in the classroom
BROADCAST LAW COPYRIGHT TERMS.
Digital Rights Management
Digital Rights Management (DRM)
4k Discussion Sony Pictures.
4K Content protection overview
4K Content protection overview
BROADCAST LAW COPYRIGHT TERMS.
BROADCAST LAW COPYRIGHT TERMS.
SPE Point of View Proposal
4K Content protection overview
Intellectual Property
The Internet: Encryption & Public Keys
Presentation transcript:

Encryption and Digital Rights Management A look at encryption technologies and their role in protecting intellectual property rights in the digital age.

We will be examining Copyrights Audio DRM Video DRM FairPlay DVD/CSS Blu Ray/ AACS (BD+)

Digital Rights Management Control access to protected material Video Audio E-Book Video Games

Whose rights? Copyright Protection Protection of original works in a tangible medium of expression Protects original works of authorship including literary, dramatic, musical, and artistic works, such as poetry, novels, movies, songs, computer software, and architecture. Do you need to register a copyright? Source - U.S. Copyright Office

Whose rights? Copyright vs. copyleft GNU-GPL What is your boss going to prefer?

Cassette Tapes Early scourge of recording industry Mix Tapes WUEC

Cassette Tapes

Digital Audio DRM - Fairplay Apple Computer DRM system AES encryption Master key stored on Apple server User key stored encrypted are in iTunes

Machine Authorization

Key Exchange When a user buys a song from the iTunes Store, a user key is created for the purchased file. The AAC song itself is scrambled using a separate master key, which is then included into the protected AAC song file. The master key is locked using the user key, which is both held by iTunes and also sent to Apple’s servers.

Playing a protected song iTunes uses the matching user key to unlock the master key stored within the song file. Keys are all encrypted and stored on the authorized iTunes computer, as well as being copied to Apple's servers. When a new computer is authorized, it also generates a globally unique ID number for itself and sends it to Apple. Apple's server sends the newly authorized machine the entire set of user keys for all the tracks purchased under the account. 

Playing on an iPod All keys are downloaded to iPod. Protected songs which do not have keys are not able to be copied to iPod.

Cracking FairPlay – Jon Johansen Song data dumped as a raw stream into a large container file, requiring further processing afterward.  PlayFair, Hymn, JHymn and other derivatives-- intercepts unlocked but not yet uncompressed song files, creating a small, ready to play, unencrypted AAC file. PyMusique, requests songs from Apple's servers and then downloads the purchased songs without locking them, as iTunes would. FairKeys pretends to be iTunes; it requests a user's keys from Apple's servers and then uses these keys to unlock existing purchased songs. Not fully cracked

Digital Audio DRM – Yahoo! What happens when DRM servers go offline?

Early Video DRM - Macrovision Used to protect VHS from recorder-recorder copying Exploits VCR gain control Mechanical work-around VCR-VCR

CSS – Content Scramble System Keys stored on lead-in areas of disc Prevents byte-for-byte copies Requires manufacturers to obtain license Keys for EVERY licensed player encrypted on DVD 40 bit cipher stream Government forbade export of >40 bit ciphers Compromised by brute force attack

DVD Encryption Keys

Linear Feedback Shift Registers Every eight clock cycles, byte is produced.

DeCSS Linux Haiku describing decryption algorithm CSS cracked by Jon Lech Johansen and two others in 1999 A computer fast enough to play a DVD was fast enough to decrypt CSS in real time. Haiku describing decryption algorithm http://www-2.cs.cmu.edu/~dst/DeCSS/Gallery/decss-haiku.txt

Code fragment of DeCSS.

ARccOS DRM protection Advanced Regional Copy Control Operating Solution Proprietary system by the Sony Corporation Added corrupt sectors which DVD players were instructed to skip Some Sony movies were unplayable even on Sony players without firmware update

Blu Ray Encryption AACS BD+ - helped win format war.

Advanced Access Content System

AACS Key Controversy 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 Copyrighted 128 bit number! Take down notices sent by Motion Picture Association of America and AACS Licensing Agent May 1st, 2007: Google search for key: 9410 results May 2nd, 2007: Over 300,000 Playback devices hold binary tree of possible keys. When key is compromised, new discs choose different key.

BD+ Works “on top” of AACS Virtual machine embedded in authorized player Examine the host environment, to see if the player has been tampered with. Verify that the player's keys have not been changed. Execute native code, possibly to patch an otherwise insecure system. Transform the audio and video output. Limit playback of a Blu-Ray disc to the first device in which the disc is played

Slysoft vs. BDA/Macrovision About a three month window between new BD+ and Slysoft’s AnyDVD cracking it. Win for studio.

Analog Hole Always possible to pass digital content through analog device to copy

http://www.math.ucsd.edu/~crypto/Projects/MarkBarry/index.htm http://www.roughlydrafted.com/RD/RDM.Tech.Q1.07/ http://www.any-dvd-clone.com/knowledge/dvd-protection-types.html http://mashable.com/2008/07/26/yahoo-drm-shut-down/ http://en.wikipedia.org/wiki/BD%2B http://en.wikipedia.org/wiki/DeCSS