When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia.

Slides:



Advertisements
Similar presentations
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
A Survey of Key Management for Secure Group Communications Celia Li.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Digital Signatures and Hash Functions. Digital Signatures.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Building an Encrypted and Searchable Audit Log 11th Annual Network and Distributed Security Symposium (NDSS '04); 2004 February 5-6; San Diego; CA. Presented.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Strong Password Protocols
SSH Secure Login Connections over the Internet
David Froot.  How do we transmit information and data, especially over the internet, in a way that is secure and unreadable by anyone but the sender.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Sinaia, Romania August, TH Workshop “Software Engineering Education and Reverse Engineering” Dhuratë Hyseni, Betim Çiço South East European University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
Phosphor A Cloud based DRM Scheme with Sim Card th International Asia-Pacific Web Conference Author : Peng Zou, Chaokun Wang, Zhang Liu, Dalei.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
WEP Protocol Weaknesses and Vulnerabilities
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
1 Lecture 9: Cryptographic Authentication objectives and classification one-way –secret key –public key mutual –secret key –public key establishing session.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
A Trusted Key Management Scheme for Digital Rights Management ETRI Journal, Volume 27, Number 1,February 2005 Yeonjeong Jeong, Kisiong Yoon, and Jaecheol.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
Department of Computing, School of Electrical Engineering and Computer Sciences, NUST - Islamabad KTH Applied Information Security Lab Secure Sharding.
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
CSCE 201 Identification and Authentication Fall 2015.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Searchable Encryption in Cloud
Re-evaluating the WPA2 Security Protocol
A secure and traceable E-DRM system based on mobile device
Presentation transcript:

When DRM Meets Restricted Multicast A Content Encryption Key Scheme for Restricted Multicast and DRM Min FENG and Bin ZHU Microsoft Research Asia

Outline Introduction Two straight-forward solutions Our solution Conclusion

Scenario Restricted multicast/broadcast ̵ Content is encrypted with symmetric encryption ̵ Users may want to save encrypted multicast/broadcast content locally for replay Premium content stored at client side should be DRM protected to prevent unauthorized usage How to combine DRM with restricted multicast/broadcast?

Challenges Encryption is designed differently for restricted multicast/broadcast and DRM ̵ Restricted multicast/broadcast Content encryption keys sent to a privileged group of users Rekey whenever membership changes ̵ DRM A single key is typically used to encrypt a file to simplify key management and delivery It is difficulty to integrate the two encryption systems into one

Straightforward Solution: Direct Recording Scheme ̵ Save encrypted multicast content directly ̵ Get all the encryption keys associated to the saved content from license server before playing Strength ̵ No extra operations needed to save content Weakness ̵ Complex key management – all multicast content encryption keys are maintained at license server ̵ Many keys may need to be delivered in a license to a client

Straightforward Solution: Transcryption Scheme ̵ Transcrypt the encrypted multicast content into DRM- encrypted content in saving to local files ̵ One simple key is transferred in the license before playing Strength ̵ One single key is in a license ̵ Key management can be simply Weakness ̵ Additional secure module – content packaging ̵ Additional operations during recording

Question Is it possible to design a key scheme for multicast such that the DRM has the advantages of both schemes? ̵ Saving multicast content directly to local files ̵ Simple DRM key management and delivery The answer is yes – An integrated content encryption key scheme proposed here

Goals of Our Project Combining advantages of both straightforward methods With the knowledge of all used keys, a hacker cannot derive the next key Control is exact: Only the requested content can be decrypted Secure against collusion and other attacks

Main Ideas in Our Solution Content encryption keys ̵ Related to each other ̵ Generated with some master secret A “seed” secret corresponding to saved content can be generated Content decryption keys can be regenerated from the “seed” secret “Seed” secret cannot derive the master secret or other content encryption keys

Our Solution – Setup n = pq, p and q are two large secret prime numbers P – a large collection of prime numbers s – a random number in (1, n) and co-prime to n A selection scheme to select numbers from P sequentially that are co-prime to and selection scheme are master secret

Our Solution – Multicast The first content encryption key is The k-th content encryption key: Selected prime number is sent to clients with the content encrypted with

Our Solution – Recording Def. Encryption block or block means a block of data encrypted with the same content encryption key in multicast – i-th block encrypted with the key Saved content and corresponding primes to be replayed directly to a local file ̵ { } & { } (i<I), I is an arbitrary set of indexes.

Our Solution – Replay Acquire a single key for saved content, where For any block in the saved file, its decryption key is derived as:

Our Solution – Security We have proved: ̵ The seed key in the license can derive only the keys corresponding to saved content and vice versa ̵ Collusion attacks cannot deduce any new keys that they have already had We can prove our scheme is equivalent to Strong RSA Assumption

Our Solution – Strength & Weakness Strength ̵ Saving multicast content directly ̵ Easy key management and one single key in a license for an arbitrarily saved blocks (no need to be indexed consecutively) ̵ Easy merging and deleting contents – Only a new seed key is delivered in a new license ̵ Secure Weakness ̵ Computation complexity ̵ Set of prime numbers may run out and reset of parameters such as s is then needed.

Conclusion We addressed problem to protect with DRM recorded content from restricted multicast/broadcast We proposed a novel multicast content encryption key scheme to facilitate subsequent DRM operations Our solution is secure and makes recording and DRM key management/delivery very simple

Questions?