LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st 46432 Yuuki Horita.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
With the friendly assistance of: 4FriendsOnly.com AG (4FO AG) and Fraunhofer IIS AEMT Potato System and Signed Media Format - an Alternative Approach to.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Encryption Methods By: Michael A. Scott
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Secure Electronic Transaction (SET)
CPTWG Jan MacroSafe TM System A Solution for Secure Digital Media Distribution Presentation to the CPTWG Jan. 15, 2002.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Digital Inheritance of Personal and Commercial Content Using DRM H. Li, NXP Research M. Petkovic, Philips Research CCNC’07 DRM workshop, Jan
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
DICOM Security Andrei Leontiev, M.S. Dynamic Imaging.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data.
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Elliptic Curve Cryptography
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
And the technology’s effect on consumer rights. What is DRM?  Defined by Encyclopedia of Multimedia as “technology [that] offers the ability to control.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Digital Signatures and Digital Certificates Monil Adhikari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
The Digital Battery From: Budd, T.A. "Protecting and Managing Electronic Content with a Digital Battery". IEEE Computer (2001) 2-8. Steve Lord.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Application program interface (API)
The Secure Sockets Layer (SSL) Protocol
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
Digital Rights Management (DRM)
ELECTRONIC MAIL SECURITY
Secure Electronic Transaction (SET) University of Windsor
ELECTRONIC MAIL SECURITY
Certificate Enrollment Process
The Italian Academic Community’s Electronic Voting System
Presentation transcript:

LWDRM (Lightweight Digital Rights Management) Information Science and Technology Master 1 st Yuuki Horita

Reference  R. Grimm, P. Aichroth : Privacy Protection for Signed Media Files : A separation-of-Duty Approach to the Lightweight DRM (LWDRM) System, In proceedings of the 2004 multimedia and security workshop on Multimedia and security 

LWDRM  DRM system developed by Fraunhofer Institute in Germany content providers users

File Format  LMF (local media file) available only on the computer into which the user downloaded it  SMF (signed media file) able to distribute freely includes the user ’ s signature

LMF content providers users RSA keys created using parameters of the user ’ s hardware AES encryption RSA encryption LMF public system key private system key contents

Decode LMF private system key RSA decryption AES decryption “ private system key ” is available only on the hardware into which the contents were downloaded (binding to the hardware)

Transform LMF into SMF  Release the session key from its local binding public user key private user key

Transform LMF into SMF (cont ’ d) Certificates of public user key Signed Receipt of content purchase SMF

Decode SMF Certificates of public user key Signed Receipt of content purchase verification RSA decryption AES decryption

Features of LWDRM  Digital contents are allowed to be transferred to the other hardware  SMF includes the user ’ s signature illegal contents can be traced back certificate of public key have to be issued by specific CA

Evaluation  meets the requirements of both contents providers and consumers illegal contents can be traced back the contents can be copied to the other hardware  makes users conscious of their responsibility for the downloaded contents  seems to take a lot of time to develop the environment

“ Separation of Duty ” Principle  separate real user name and digital contents use pseudonymous consumer id instead of real user name