Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Cryptography and Network Security Chapter 9
Cryptography and Network Security
Asymmetric-Key Cryptography
Data encryption with big prime numbers
Public Key Encryption Algorithm
By Claudia Fiorini, Enrico Martinelli, Fabio Massacci
Session 4 Asymmetric ciphers.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
© 2006 Pearson Addison-Wesley. All rights reserved13 A-1 Chapter 13 Hash Tables.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Chapter 3 Encryption Algorithms & Systems (Part C)
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Public Key Model 8. Cryptography part 2.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Bob can sign a message using a digital signature generation algorithm
The RSA Algorithm Rocky K. C. Chang, March
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Key Management and Diffie- Hellman Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther.
CS548 Advanced Information Security Presented by Gowun Jeong Mar. 9, 2010.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
CS212: DATA STRUCTURES Lecture 10:Hashing 1. Outline 2  Map Abstract Data type  Map Abstract Data type methods  What is hash  Hash tables  Bucket.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Public-Key Cryptography CS110 Fall Conventional Encryption.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Cryptography and Network Security (CS435) Part Eight (Key Management)
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Elements of Coding and Encryption Continuation 1.
RSA Public Key Crypto System. About RSA Announced in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adleman Relies on the relative ease of finding large.
Computer and Network Security Rabie A. Ramadan Lecture 6.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Key Management Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Chapter 1 Algorithms with Numbers. Bases and Logs How many digits does it take to represent the number N >= 0 in base 2? With k digits the largest number.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Cryptography Deffie hellman. organization Foundations Symmetric key Symmetric key weaknesses Assymmetric key Deffie hellman – key exchange RSA – public.
Public Key Cryptography
Public Key Encryption Major topics The RSA scheme was devised in 1978
B. R. Chandavarkar CSE Dept., NITK Surathkal
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Presentation transcript:

Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios

Fingerprinting of Content If protected content is somehow released from a playback device, it may be desirable to have a method to enable identification of the device from which the content was released.

Fingerprinting by the Device A simple approach to fingerprinting is have have each playback device insert a unique identifying signal into its output stream. Drawbacks … A compromised player can bypass this step. Deployed fingerprinting schemes are difficult to update.

Differential Decryption It would be nice if it were possible to give different keys to each playback device such that the content is slightly different when decrypted with distinct keys.

Differential Decryption Encrypted Content Decrypted Content Decrypted Content Key 2 Key 1

Differential Decryption A simple observation is that differential decryption is possible to achieve (although usually impractical) by creating two separate and slightly different copies of the original content.

Differential Decryption Encrypted Content Decrypted Content Decrypted Content Key 2 Key 1

Differential Decryption Encrypted Content Decrypted Content Decrypted Content Key 2 Key 1 Encrypted Content

Differential Decryption The efficiency and utility of differential decryption can be greatly enhanced by dividing content into clips and separately encrypting two slightly different versions of each clip.

Differential Decryption Encrypted Clip 1AEncrypted Clip 1B Encrypted Clip 2AEncrypted Clip 2B Encrypted Clip 3AEncrypted Clip 3B Encrypted Clip 4AEncrypted Clip 4B

Differential Decryption Encrypted Clip 1AEncrypted Clip 1B Encrypted Clip 2AEncrypted Clip 2B Encrypted Clip 3AEncrypted Clip 3B Encrypted Clip 4AEncrypted Clip 4B Key 1A Key 2A Key 3A Key 4A Key 1B Key 2B Key 3B Key 4B

Differential Decryption Clear Clip 1AClear Clip 1B Clear Clip 2AClear Clip 2B Clear Clip 3AClear Clip 3B Clear Clip 4AClear Clip 4B Key 1A Key 2A Key 3A Key 4A Key 1B Key 2B Key 3B Key 4B

Differential Decryption If each playback device is given exactly one of the two decryption keys for each clip, the output generated by that device will form a pattern that can be regarded as a fingerprint of the device.

Differential Decryption Clear Clip 1AEncrypted Clip 1B Encrypted Clip 2AClear Clip 2B Clear Clip 3AEncrypted Clip 3B Clear Clip 4AEncrypted Clip 4B Key 1A Key 3A Key 4A Key 2B

Differential Decryption Encrypted Clip 1AClear Clip 1B Clear Clip 2AEncrypted Clip 2B Clear Clip 3AEncrypted Clip 3B Encrypted Clip 4AClear Clip 4B Key 2A Key 3A Key 1B Key 4B

Differential Decryption The content need not be doubled! It is not necessary to divide the entire content into clips!!! It is only necessary to place these parallel clips into a small portion of the content.

Differential Decryption Even if the keys are removed from a playback device, content decrypted with its keys will retain its fingerprint. The fingerprint is dependent only upon the decryption keys used – not the hardware that held them.

Differential Decryption Any method (such as watermarking) can be used to distinguish the two versions of each clip. The differentiation scheme is dynamic and need not be fixed by the playback device.

Are More Keys a Problem? The number of content keys that must be transmitted to a playback device seems to grow with the number of clips.

More Keys are not a Problem As many keys as desired can be packed into the space of a single key. Either of two crypto tricks can be used. 1.Broadcast Encryption 2.A new application of a technique invented by Chick and Tavares

Broadcast vs. Narrowcast The method can be illustrated by showing a grid of participants against clips. Each participant is entitled to the keys for the clips shown in orange.

Broadcast vs. Narrowcast Recipients Clips

Broadcast vs. Narrowcast Recipients Clips

Broadcast Using Broadcast Encryption, for each clip, the set of participants entitled to that clip is determined, and a single encryption of that clips key is produced that enables those (and only those) participants to derive that clips key.

Broadcast Recipients Clips

Broadcast Encryption One encryption per clip key. Time to encrypt/decrypt each clip key is proportional to number of copies of content distributed. Collusion can allow recipients access to keys to which they are not entitled.

Narrowcast Using the technique of Chick and Tavares, for each participant, the set of clips to which that participant is entitled is determined, and a single value is produced that allows the participant to derive those (and only those) clip keys.

Narrowcast Recipients Clips

Narrowcast Recipients Clips

Narrowcast One encryption per recipient. Time to encrypt/decrypt each clip key is proportional to the number of clip keys. Collusion does not provide access to additional clip keys. Amortization and other efficiencies can significantly reduce encrypt/decrypt times.

Narrowcast Some details of the mathematics behind the narrowcast method are presented in the following slides.

Narrowcast Clip 1A Clip 1B Clip 2A Clip 2B Clip 3A Clip 3B Clip 4A Clip 4B

Small Prime Assignment Clip 1A Clip 1B Clip 2A Clip 2B Clip 3A Clip 3B Clip 4A Clip 4B Prime 1A Prime 2A Prime 3A Prime 4A Prime 1B Prime 2B Prime 3B Prime 4B

Clip Key Encryption Select a large composite integer N. Let y in Z N *. Compute each clip key as y 1/p mod N where p is the small prime associated with the clip.

Clip Key Encryption Select a large composite integer N. Randomly select an integer x in Z N *. Let P = (all small clip primes). Let y = x P mod N. Compute clip key k = Hash(y 1/p mod N) where p is the small prime associated with the clip.

Clip Key Distribution For a given recipient, define ρ to be the product of all small clip primes associated with clips to which that recipient is not entitled. Give that recipient the amalgamated key value x ρ mod N.

Clip Key Decryption To obtain a single clip key, a recipient can take amalgamated clip key x ρ mod N. and raise it to the power of all appropriate small primes except the small prime p associated with the desired clip.

Security of other Keys Shamirs Root Independence Lemma (1980) shows that given y 1/p mod N and y 1/q mod N, finding y 1/r mod N is as hard as computing arbitrary roots modulo N (RSA assumption) unless r|(pq).

Amortization A set of m keys can be decrypted using time m log m beyond the time to decrypt a single key. After an initial step linear in the number of keys, each of m subsequent keys can be delivered in log m time.

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 x

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 x xp5p6p7p8xp5p6p7p8

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 x xp5p6p7p8xp5p6p7p8 xp1p2p5p6p7p8xp1p2p5p6p7p8

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 x xp5p6p7p8xp5p6p7p8 xp1p2p5p6p7p8xp1p2p5p6p7p8 xp1p2p4p5p6p7p8xp1p2p4p5p6p7p8

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 m leaves

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 m leaves log m levels

Amortized Decryption 1,8 1,4 1,2 1,12,2 3,4 3,34,4 5,8 5,6 5,56,6 7,8 7,78,8 m leaves log m levels m small prime exponentiations per level

Conclusions Flexible fingerprinting methods are an important tool in content protection. Large amounts of keying material may be required for such fingerprinting. The methods described minimize the bandwidth requirements for these schemes.