Feeds

Intel confirms HDCP copy-protection crack

That's torn it

Build a business case: developing custom apps

Intel has confirmed Blu-ray HDCP encryption is cracked after admitting a leaked master key is the real deal.

High-bandwidth Digital Content Protection (HDCP) copy protection technology is designed to protect high-definition video content as it travels across digital interfaces. The technology was developed by Digital Content Protection, a subsidiary of Intel, and licensed to HDTV, set-top boxes and Blueray disk manufacturers and the like.

A leaked key, now confirmed as genuine, was published online on Tuesday via Pastebin, and quickly spread around the web. The master key creates a mechanism to strip the encryption from, for example, a HD satellite TV broadcast and a DVR, at least in theory. The availability of a master key effectively renders the key revocation feature built into HDCP impotent.

Tom Waldrop, a spokesman for Intel, confirmed that the leaked key works as advertised, although practical hacks would be hard if not impossible to achieve.

"What we have confirmed through testing is that you can derive keys for devices from this published material that do work with the keys produced by our security technology," Waldrop told FoxNews, adding: "This circumvention does appear to work."

Intel reckons that someone exploiting the hack would need to build a device that ignores HDCP copy protection, with a specialist chip. Software hacks would simply be too slow.

The chip giant is keen to reassure the entertainment industry that the situation is under control. "HDCP remains an effective component for protecting digital entertainment," Waldrop said. "It relies on these licensing agreements to ensure that implementations are done appropriately, and there are legal enforcement methods available for cases where it is done inappropriately."

The volume of HD content already available for download via torrents provides ample evidence that pirates are already available to lift content from Blueray discs. Nonetheless the circumvention of HDCP is still noteworthy for both cryptologists and the entertainment industry because it involves a break in the core technology used to protect HD content, rather than its circumvention on individual titles or discs. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?