Security Analysis of the Digital Transmission Copy Protection Specification

نویسندگان

  • Haibo Tian
  • Yumin Wang
چکیده

This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination of the Diffie-Hellman (DH) key exchange algorithm and the digital signature technique. It is claimed that the protocol can prevent “man in the middle” attacks. However, we can apply at least three classical attacks to the protocol. All of them can overthrow the authentication objective. Further, a sender or receiver mismatching is discovered. The receiver mismatching threats the system integrity property of the DTCP specification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Content Protection for Optical Media Content Protection for Optical Media A Comparison of Self-Protecting Digital Content and AACS

Our evaluation considered VM specification version 1.0b and Interface Specification 0.95a. We also examined the integration of SPDC with the Advanced Access Content System (AACS) as defined by the AACS public specification revision 0.90 (dated April 14, 2005), along with supplemental slides and materials. We first note several flaws in the current version of the AACS specification, and further ...

متن کامل

Contents protection system using smart card interface for digital CATV network based on the OpenCable specification

In this paper, we have proposed the merging of the OpenCable reference model with the smart card interface defined by ISO/IEC 7816-3 and have implemented a new Conditional Access System (CAS) using this interface along with a Personal Computer Memory Card International Association (PCMCIA) interface. In addition, we have also designed the hardware architecture of the Point-ofDeployment (POD) se...

متن کامل

Construction of Network Security Architecture Based on Formal Specification in Digital Campus

With comprehensive analysis on security requirements of information transmission in digital campus, new primitives in asymmetric and symmetric cryptographic system are designed to describe essential security attributes. Secure information transmission is constructed with composition of the generated primitives and realized with common security technologies. And then, formal analysis shows that,...

متن کامل

Digital Watermarking Technology in Different Domains

Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...

متن کامل

Lessons from the Sony CD DRM Episode

In the fall of 2005, problems discovered in two SonyBMG compact disc copy protection systems, XCP and MediaMax, triggered a public uproar that ultimately led to class-action litigation and the recall of millions of discs. We present an in-depth analysis of these technologies, including their design, implementation, and deployment. The systems are surprisingly complex and suffer from a diverse a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006