Digital Rights Management: The Technology behind the Hype Mark Stamp Department of Computer Science San Jose State University.

Slides:



Advertisements
Similar presentations
ContentGuard An Intellectual Property Company IPED Conference November 1, 2007 Presented By Eddie Chen CONTENTGUARD.
Advertisements

Digital Rights Management © Knowledge Books & Software, 2012.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cloakware Corporation, 260 Hearst Way, Suite 311, Kanata, Ontario, Canada K2L 3H1 Spencer Cheng Trusting DRM Software Presentation.
Software Part 4  Software 2 Software Reverse Engineering (SRE)
This presentation will take a look at to prevent your information from being discovered by and investigator.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Digital Rights Management © Knowledge Books & Software, 2012.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Cryptography The science of writing in secret code.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
Startup 1 The Life and Death of a Silicon Valley Startup Company Mark Stamp Department of Computer Science San Jose State University.
The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
C opyright Protection and Digital Rights Management 1.
DIGITAL RIGHT MANAGEMENT Bùi Thành Đ ạ t Nguy ễ n Hoàng Nh ậ t Đông Nguy ễ n Duy C ườ ng
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Programming Satan’s Computer
1 6 Chapter 6 Implementing Security for Electronic Commerce.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
DRM 1 Digital Rights Management the Good, the Bad and the Ugly Mark Stamp Department of Computer Science San Jose State University DRM.
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Linux Networking and Security Chapter 8 Making Data Secure.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Cryptography, Authentication and Digital Signatures
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Encryption.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Information Systems Design and Development Security Precautions Computing Science.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
PDF Security Issues Doing your bit to help Betsy Kent May 2010.
Implementing Security for Electronic Commerce
Crypto in information security
Digital Rights Management (DRM)
Encryption, Cryptography, and Steganography:
Faculty of Science IT Department By Raz Dara MA.
Fun Stuff: Digital Media
Presentation transcript:

Digital Rights Management: The Technology behind the Hype Mark Stamp Department of Computer Science San Jose State University

DRM2 This talk…  What is DRM?  Overview of MediaSnap DRM system  Other DRM systems  Conclusions

DRM3 What is DRM?  “Remote control” problem  Digital book example  Digital music, video, documents, etc.  Privacy

DRM4 Persistent Protection  Restrictions on use after delivery  No copying  Limited number of reads  Time limits  No forwarding  etc.

DRM5 What to do?  The honor system (The Plant)  Give up (HIPAA, etc.)  Lame software-based DRM  Better software-based DRM  Tamper-resistant hardware

DRM6 The hype  “Our solutions let enterprises control their confidential information at all times, even after the recipients receive it.” --- Authentica  “Seal confidential digital documents and protect you business against intellectual property theft indefinitely.” --- SealedMedia

DRM7 Is crypto the answer?

DRM8 Current state of DRM  Security by obscurity (at best)  Secret designs (Kerckhoff’s Principle?)  Crypto is king  “Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.” --- Attributed by Roger Needham and Butler Lampson to each other

DRM9 MediaSnap’s DRM system SSecure Document Server (SDS) PPDF plugin (or reader) SSecurity stuff…

DRM10 Protecting a document SDS Recipient Sender encrypt persistent protection

DRM11 Tethered mode SDS Recipient Sender key

DRM12 Untethered mode SDS Recipient Sender key

DRM13 Security issues  Server (SDS)  Protect keys, authentication data, etc.  Apply persistent protection  Client (Reader/PDF plugin)  Protect keys, authenticate, etc.  Enforce persistent protection

DRM14 Document reader security Obscurity Tamper-resistance

DRM15 Anti-debugger Encrypted code Tamper-resistance

DRM16 Obscurity  Key management  Authentication  Caching (keys, authentication, etc.)  Encryption and “scrambling”  Key parts (data and code)  Multiple keys

DRM17 Other MediaSnap features  Module tamper checking (hashing)  Anti-screen capture  Watermarking  “Unique-ification”

DRM18 Other possibilities  General code obfuscation  Code “fragilization” (guards)  OS issues

DRM19 Make fun of DRM systems  Patently obvious  Crypto claims  Sillyness  “Respect” model  MS-DRM

DRM20 InterTrust “…a company whose business model appears to rely entirely on legal filings against Microsoft.”

DRM21 Crypto claims Q: How does Atabok security compare to the competition? A: The majority of service providers offer the ability to encrypt at 128- bits. Atabok encrypts your content with 256-bit encryption, which is exponentially more secure.

DRM22 Sillyness  secretSeal’s five “radical innovations”  hieroglyphic passwords  variable-length encrypted keys  morphogenetic encryption algorithm  no encryption formula in software  the use of public keys

DRM23 The respect model Adobe eBooks --- “It is up to the implementors of PDF viewer applications to respect the intent of the document creator by restricting access to an encrypted PDF file according to passwords and permissions contained in the file.”

DRM24 MS-DRM (version 2)  Weak proprietary block cipher (MultiSwap) used for hashing  No controlled execution  No obfuscation, etc.

DRM25 Conclusions  Current DRM systems are weak  Ideal software-based DRM…  Individual content is non-trivial to attack  Overall system survives repeated attacks  Is this possible?

DRM26 More info…  M. Stamp, Digital rights management: The technology behind the hype, Journal of Electronic Commerce Research,  M. Stamp, Risks of digital rights management, Communications of the ACM,  M. Stamp, Digital rights management: For better or for worse?, ExtremeTech,