Content Scramble System for DVD PeiXian Yan,Bo Zhou,Gang Liu, ZongPeng Liu, Matthew Black December 6,2004 Supervised by Andy Brown.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

ECE454/CS594 Computer and Network Security
Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Modern Symmetric-Key Ciphers
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Sri Lanka Institute of Information Technology
Content Scrambling System (CSS) Gregory Kesden, Carnegie Mellon University, /Fall 2000 This is a draft document. Please report errors, omissions,
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Lecture 23 Symmetric Encryption
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
File System Security Jason Eick and Evan Nelson. What does a file system do? A file system is a method for storing and organizing computer files and the.
Computer Security CS 426 Lecture 3
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Applied Cryptography Spring 2015 DVD and CSS encryption.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
9/01/2010CS 686 Stream Cipher EJ Jung CS 686 Special Topics in CS Privacy and Security.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 20 Symmetric Encryption and Message Confidentiality.
1 Anonymous Trust: Digital Rights Management Using Broadcast Encryption Proceedings of the IEEE, Vol. 92, No. 6, June 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
WEP Protocol Weaknesses and Vulnerabilities
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 23 Symmetric Encryption
The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
University of Malawi, Chancellor College
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Content Scramble System for DVD
Triple DES.
Content Scrambling System (CSS)
Security through Encryption
SYMMETRIC ENCRYPTION.
Encryption and Digital Rights Management
Presentation transcript:

Content Scramble System for DVD PeiXian Yan,Bo Zhou,Gang Liu, ZongPeng Liu, Matthew Black December 6,2004 Supervised by Andy Brown

Content Scramble System Introduction to CSS and DeCSS Encryption on the DVD in CSS How a DVD player plays DVD Cryptanalysis of CSS Comparison with other techniques Conclusion

Introduction What is CSS? CSS: Content Scramble System. It is the data scrambling method used to garble the content of a DVD disc. Data on DVD is protected by CSS,DVD can not be copied. Only be usable with licensed DVD playback mechanisms. Windows and MAC have CSS licence. Linux does not.

Introduction How does CSS work? Every DVD player on the market today is coded with a small set of "player keys" Every DVD disc on the market today is coded with a "disk key", identifying that disc. When a DVD player attempts to read a DVD, the player uses it's player key and proceeds down the list of encrypted disk keys on the disc.

Introduction Cannot play DVD under Linux OP DeCSS introduced. What is DeCSS ? DeCSS is an executable binary utility, written for Microsoft Windows. Unscrambled MPEG-2 video files can be copied to the user's hard drive by DeCSS. MPEG-4 video files can be made from DVD very easily,which is very easy to transfer through the web.

Introduction ‘ *.vob ’ file MPEG-4 file (very large) (much smaller) MPEG-2 file (protected By CSS) DeCSS FlaskMPEG How to store the DVD data in to PC DVD PC

Introduction Where does DeCSS come from? An anonymous German hacker from MoRE(master of reverse engineering) was respons for writing the code. Jon Johanson, a 16-year-old Norwegian put it on to the web in late September MPAA(The Motion Picture Association of America ) ’ s response.

Introduction How does DeCSS work ? DeCSS operates much as any other DVD player operates - it uses a player key to unscramble the scrambled contents of a DVD to make playable MPEG-2 video files. All versions of DeCSS currently in release are built around the Xing player key, which reportedly has been revoked. If this is true, no newly-released DVDs can be descrambled with this player key; DeCSS will not work on these DVDs.

Introduction Why was CSS made so weak? CSS uses a 40-bit key. Even if the scrambling algorithm is well-designed, the short key length means that a brute-force search will quickly find the key ! Since at the time (in 1996) the U.S. export regulations banned export of strong encryption technologies.

Introduction CSS is different from other examples of cryptography such as encrypted . Unlike encrypted where the objective of the encryption is to maintain privacy, CSS has nothing to do with maintaining privacy or secrecy of the video. Anyone who buys a DVD containing a CSS "encrypted" movie can view that movie by placing it in a DVD player. This is totally unlike encrypted mail which only the intended recipients can read.

CSS Overview Protection from piracy Client-host authentication Enforce region-based codes Stream encryption

Keys for in CSS Region key Authentication key Session key Player key Disk key Title key Sector Key- in bytes of a sector (a logical or physical group of bytes recorded on the disc)

Encryption in CSS System ’ s security depends entirely on the insides of the keystream generator. (APPLIED CRYPTOGRAPHY, BRUCE SCHNEIER) So …… what keystream we need? Pseudo-random bit stream Generates unpredictable key-stream (at least in any reasonable amount of time, harder time to break it)

Generic LFSR A shift register Tap sequence Certain tap sequences will cycle through all 2^n-1 possible internal states (called maximal length LFSR) XOR Output Feedback Path

XOR Output CSS ’ LFSR17

XOR Output CSS ’ LFSR17

XOR Output 11

CSS ’ LFSR XOR Output 0

CSS ’ LFSR XOR Output 1 0

CSS ’ LFSR XOR Output 1 0 0

CSS ’ LFSR XOR Output 1 0

CSS ’ LFSR XOR Output 1 01

CSS ’ LFSR XOR Output 10 01

CSS ’ LFSR XOR Output 1 01

CSS ’ LFSR XOR Output011 0

CSS ’ s LFSRs CSS: LFSR17 (2 bytes+1bit seeded in bit 4) CSS: LFSR25 (3 bytes+1bit seeded in bit 4) So …… CSS uses a 40-bits key Addition between the LFSRs

More on LFSR Bit-wise Inverter before addition 1 byte Output-byte LFSR-17 LFSR bit add Optional bit-wise inverter Carry-out from the previous addition 1 byte Carry-out

inverter modes ModeLFSR-17LFSR-25 AuthenticationYesNo Session KeyNo Title keyNoYes DataYesNo

Data Encryption LFSRs are seeded Generates pseudo-random bit stream Substitution on Video data byte XORed the bitstream and Substitution

Data Encryption Output byte from LFSRs Input data byteTable-based substitution XOR Output data bytes

Key Encryption/Decryption 0 Permutation table + Permutation table K Permutation table + Permutation table K Permutation table + Permutation table K Permutation table + Permutation table K Permutation table + Permutation table K4 + 5 Bytes of Ciphertext Bytes of Plaintext CSS streamcipher used to encrypt/decrypt keys

Play a CSS protected disc DVD itself Content delivery in between DVD player

DVD and DVD player Encrypted content (hidden area) A table of encrypted disk keys, disk hash Player keys (used to decrypt the disk key) Region code( identifies in where player should be used) Another secret (used for authentication)

Mutual Authentication Between the Host and the Player. With the authenticated device (licensed by the DVD Copy Control Association) Verifies both sender and receiver are licensed to use the system A session key is agreed on to prevent eavesdropping

Mutual Authentication Host Drive AGID Request AGID Chanllenge(H) (nonce) Encrypted Chanllenge(H) Chanllenge(D) (nonce) Success or Failure Encrypted(D) Initialization done Encrypt Challenge Decrypt and verify Challenge(D) Session key is encrypted Challenge(H) + Challenge(H) Decrypt and verify Challenge(H) Encrypt Challenge(D) Session key is encrypted Challenge(H) + Challenge(H) Initiaization done

Data transfer Decrypt disk key Verify disk key (hash) Decrypt the title key Data decrypted by the XOR of the title key and the sector

Brute Force attack on disk keys CSS only uses 40 bit keys Possible to find disk key by looking at 2 40 possible disk keys. This attack is in fact possible with a complexity of 2 25 by attacking the hash making it feasible in runtime applications

Attack with 6-bytes of LFSR output. Not a terribly useful attack, we don ’ t normally have 6-bits lying around Provides a 2 16 attack on the algorithm Allows us to find 16(plus 1) bit register Find input of LFSRS Hence we have the key.

Attack with 6-bytes of LFSR output. 1. For each Guess of the contents of LSFR Clock out 4 bits 2. Get the output of LSFR-25 by subtracting 3. Workout the contents of LSFR-25 from the output

Attack with 5-bytes of LFSR output. Much more practical here For each guess of contents of LSFR-17 Clock out 3 bytes from LSFR Determine corresponding bytes from LSFR- 25 Reveals all but highest order bit from LSFR-25 Attempt to verify each final bit.

CSS Mangling When used to encrypt keys an additional mangling step takes place By trying all 256 possibilities Possible to recover 5 output bytes from LSFRS and hence find key from above attack

Content Protection Technologies

Copy protection methods integrated within DVDs Copy Generation Management System (CGMS) Analog Protection System (APS) Content Scrambling System (CSS)

CGMS Each sector of a DVD disc includes CGMS that defines how many times the data can be copied. Three copying “ states ” : --copy enable, copy one generation, copy never Two formats: --analog(i.e., CGMS-A), digital(i.e., CGMS-D)

APS A method of forcing copies to be degraded or inhibited when copies are made of video signals containing the Macrovision signals. Two separate technologies: Automatic Gain Control (AGC) Color Stripe

CSS A data encryption and authentication scheme intended to prevent copying video files directly from the disc.

The various approaches Content Protection for Recordable Media (CPRM) Content Protection for Pre-recorded Media (CPPM) Content Protection System Architecture (CPSA) Digital Transmission Content Protection (DTCP)

The various approaches High-bandwidth Digital Content Protection (HDCP) Extended Conditional Access (XCA) Advanced Access Content System (AACS)

CSS CPPM Protects video content distributed on DVD Uses 40-bit key Weak key management Common weakness Protect pre-recorded DVD audio content Uses 56-bit key Better key management Common weakness

CSS vs AACS CSS uses a 40-bit key. ----brute force attack can be carried out with a complexity of 2 40 AACS uses AES brute force attack can be carried out with a complexity of 2 128

CSS vs AACS AACS uses advanced Media Key Block (MKB) to manage and revoke keys AACS would potentially allow people to store copies of a movie on home computers and watch it on other devices connected to a network — or even transfer it to a portable movie player

Conclusion A Mechanism of encrypt data to DVD disk. Still been used?