Feeds

Cryptography Research wants piracy speed bump on HD DVDs

The rush is on

  • alert
  • submit to reddit

Build a business case: developing custom apps

Cryptographic Research's senior security architect, who also mockingly refers to himself as "chief anti-pirate" is Carter Laren, and Cryptography Research is both realistic about just what it takes to stop pirates and how difficult that is, as well as optimistic that the two competing associations are set to choose its own submission as the basis for this protection system.

Cryptography Research (CR) is just a 15-man intellectual property company, but it was single handedly responsible for discovering how professional pirates use Differential Power Analysis to read encryption keys and break complex coding systems thought to be uncrackable, and has also come up with circumvention strategies. Virtually all the intellectual property around DPA is held by CR and is licensed all over the world. CR also wrote the SSL3 secure sockets layer security version for the IETF.

Put simply, DPA is a system of "listening" to power distribution on semiconductors as they read encryption keys. Circumvention comes from balancing out all power use when an encryption key is being applied so that it cannot be read just by observing which circuits are active.

If it appears to you that DPA is really about making it harder for the "professional" pirate who makes a fortune from illicit manufacture of pirated goods, rather than about stopping college kids from using P2P networks to swap files, then you'd be right.

"We would rather chase professional pirates than College students," says Laren, and this shows in his strategy to build a protection system.

What CR has built, he calls Self Protecting Digital Content or SPDC. In effect this is a form of content that is no longer passive and includes code that can execute in a specially constructed SPDC virtual machine that resides in each player.

The logic behind this approach is that so far Digital Rights Management systems have tried to both support a trust chain, a way of moving decryption keys around between devices, as well as allowing the expression of rules to decide what usage is allowed with that content.

What CR does instead is much simpler and more direct. It tries to cut off any player that has been used for mass piracy.

"When a pirate makes a copy of a film encoded as SPDC, the output file is cryptographically bound to a set of player decryption keys. So it is easy when looking at a pirated work on a peer to peer network, or any copies found on copied DVDs, to identify which player made those copies," said Laren "When the content owner sends out any further content it can contain on it a revocation of just the player that was used to make a pirated copy."

"We picture a message popping up on a screen saying something like 'Disney movies won't play on your player any more please call this number for further information.' Or perhaps 'To fix this please call Disney with your credit card,' something like that anyway.

"We know that pirates can make copies by tapping the MPEG stream with modified players, or by making a bit for bit copy of the disk, or by using an analog attack (catching the film stream on the way to the TV over aerial cabling and re-digitizing it). But using this cryptographical binding we have forensic marking visible on the copy."

The neat thing about this process is that if someone makes copies for their own use, that can be enabled. Private individuals could be allowed to make copies for other players, even for their friends, and that's no problem.

It's only when a pirated copy is discovered coming back to a content owner (presumably watching P2P sites) that a player will get revoked, and that is only effective on content made after that point, with the revocation message in it.

Build a business case: developing custom apps

Next page: Related stories

More from The Register

next story
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Premier League wants to PURGE ALL FOOTIE GIFs from social media
Not paying Murdoch? You're gonna get a right LEGALLING - thanks to automated software
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Ballmer quits Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.