The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006.

Slides:



Advertisements
Similar presentations
Content Scramble System for DVD PeiXian Yan,Bo Zhou,Gang Liu, ZongPeng Liu, Matthew Black December 6,2004 Supervised by Andy Brown.
Advertisements

1 Copyright Protection Lecture 1:Watermarking and Fingerprinting (passive copyright protection) Lecture 2:Tracing and Revoking pirates. (copyright protection.
Why the DMCA has the right to outlaw numbers
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Chapter 20 Copyright and Privacy. Copyright versus Privacy Author has interesting insight into the combination of these The new model is to purchase product.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 12: October 21, 2003 Copyright Law, continued: the DMCA.
Content Protection for Recordable Media Florian Pestoni IBM Almaden Research Center.
The Darknet and the Future of Content Distribution by Shruthi B Krishnan.
MPAA vs Copyright Law & You. Roadmap Introduction What is at stake? How will this effect you? Conclusions – The Bigger Picture.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
1 DVD Copyright Management Schemes Tanveer Alam CVN.
DRM & Key Revocation By David Coleman. DRM & Key Revocation ► Digital Rights Management – A system for controlling the use of content ► Key Revocation.
Protection for Web Delivered Music Patcharinee Tientrakool EE 6886: Topics in Signal Processing - Multimedia Security System.
Digital Rights Management Bill Cody – MSIT-526 – 12/20/05.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CONTENT PROTECTION AND DIGITAL RIGHTS MANAGMENT
C opyright Protection and Digital Rights Management 1.
Encryption Methods By: Michael A. Scott
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Applied Cryptography Spring 2015 DVD and CSS encryption.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Macrovision Corp. November 18, 2004 David Mizell Mary Voss Wei Wang.
Passwords, Encryption Forensic Tools
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
CHAPTER 6 Cryptography. An Overview It is origin from the Greek word kruptos which means hidden. The objective is to hide information so that only the.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Data Encryption Chris Mraovich. Overview Purpose of EncryptionPurpose of Encryption Permutations Bases and FactoradicsPermutations Bases and Factoradics.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
DRM: Technology overview Keunwoo Lee CSE 590 SO 19 April 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Sony Pictures Confidential Watermarking in AACS. Sony Pictures Confidential SPE Forensic Watermarking Goals Goals: – Identify the device that was compromised.
1 CHAPTER 5 DIFFING. 2 What is Diffing? Practice of comparing two sets of data, before and after a changed has occurred Practice of comparing two sets.
Advances in Digital Video Content Protection E. T. Lin, A. M. Eskicioglu, R. L. Lagendijk and E. J. Delp Proceedings of the IEEE, VOL. 93, NO. 1, January.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data.
The DMCA, DeCSS, Copyrights and the First Amendment.
Is It Stealing? By Amber Porter. Key Terms  Software licensing- Allowing an individual or group to use a piece of software  Piracy- The unauthorized.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Attacking an obfuscated cipher by injecting faults Matthias Jacob Dan Boneh Edward.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
A Signature-like Primitive for Broadcast-encryption- based Systems Jeffrey Lotspiech IBM Almaden Research Center.
Maninda Edirisooriya. Introduction Extension for Google Chrome. Privacy protection system for online chat. Encrypts chat text using 128 bit AES. Decrypts.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Message Authentication Code
Outline The basic authentication problem
Content Scramble System for DVD
Top 3 Best Cinavia Removal Software
Triple DES.
Applying Digital Watermarking Technology to Control CD copying
Licensing, Copyrights, Piracy, and Pilferage: The protection and theft of products By: Thomas O’Rourke.
Encryption and Digital Rights Management
Eric L. Frederich COT 4810 Sept
Presentation transcript:

The Content Scrambling System (CSS) Carlos Garcia Jurado Suarez 03/10/2006

What is CSS? CSS is the mechanism for encrypting data on DVDs. Created and administered by the DVD Copy Protection Association around The need: DVDs contain digital and high quality versions of movies so perfect copies can be made if the data is not protected. CSS is not very effective.

CSS basics Each DVD has a main disk key, which is encrypted with 409 keys (the keys are owned by the CCA). DVD players have a subset of keys embedded in them (licensed from the CCA) The players use one of these keys to decrypt the disk key. The decryption is validated against a hash of the decrypted key that is included in the disk.

The CSS Cipher

Why did CSS fail? Weak cipher. The CSS encryption primitive uses a 40 bit key and is based on LFSRs (a 2 16 attack is possible). Software DVD players. These have to ship keys in software so they are easily obtainable. Decrypted data is present in memory at some point. No revocation mechanism.

DeCSS Software created by three Norwegian programmers than can rip most DVDs to a hard drive. Was created be reverse engineering the Xing player (by Real Networks). Widely available online.

What’s next? At this time all 409 keys are public. New standard being developed: AACS (Advanced Access Content System). –Based on AES. –Watermarking for detection of illegal copies –NNL/Media Key Blocks for key management and revocation.