Unformatted text preview:

DVD DecryptionDVD CSSDVD ConsortiumContent Scrambling System (CSS)CSS Algorithm CharacteristicsFlaws in the Security ModelMore FlawsDeCSS Decrypting CSSThe future of DeCSSResultsThe future of DVD’sEthical IssuesPiracy of DataReverse EngineeringFreedom of SpeechConclusionsSourcesDVD DecryptionDVD DecryptionWhat happened and is it ethical?What happened and is it ethical?DVD CSSDVD CSSThe purpose of encrypting data on The purpose of encrypting data on DVD.DVD.The CSS Security Model.The CSS Security Model.How that security model is flawed.How that security model is flawed.DeCSS. What is it? How did it happen?DeCSS. What is it? How did it happen?What does that mean for the future? What does that mean for the future? Ethical issues presented by DeCSS.Ethical issues presented by DeCSS.DVD ConsortiumDVD ConsortiumDesign “an effective system to prevent Design “an effective system to prevent unauthorized copying of motion pictures unauthorized copying of motion pictures and other filmed entertainment on and other filmed entertainment on prerecorded DVD-video.”prerecorded DVD-video.”11 Prevent digital duplication of the originalPrevent digital duplication of the originalPrevent the piracy of moviesPrevent the piracy of moviesContent Scrambling System Content Scrambling System (CSS)(CSS)Scrambles the MPEG-2 content so that Scrambles the MPEG-2 content so that it cannot be copied.it cannot be copied.CPU unintensive, so that inexpensive CPU unintensive, so that inexpensive hardware could decrypt it.hardware could decrypt it.Should be “unbreakable”Should be “unbreakable”CSS Algorithm CharacteristicsCSS Algorithm CharacteristicsCSS Key is a 40 bit key.CSS Key is a 40 bit key.Every DVD player has one of the 400 Every DVD player has one of the 400 CSS keys. CSS keys. Every DVD can be decrypted by any of Every DVD can be decrypted by any of the 400 keys.the 400 keys.That key is encrypted within the DVD That key is encrypted within the DVD player.player.Flaws in the Security ModelFlaws in the Security ModelCSS cannot prevent a bit-by-bit copy of a CSS cannot prevent a bit-by-bit copy of a DVD.DVD.That a 40 bit key, can be broken by trying That a 40 bit key, can be broken by trying the 2the 24040 possibilities. possibilities.There are algorithms that can crack it There are algorithms that can crack it with a complexity of 2with a complexity of 22525. . 22 The encryption scheme itself was simple.The encryption scheme itself was simple.More FlawsMore FlawsThe data has to be decoded into the raw The data has to be decoded into the raw data at some point, and that raw data data at some point, and that raw data can be captured, bypassing the CSS.can be captured, bypassing the CSS.Security through “Obscurity” is not Security through “Obscurity” is not effective.effective.If someone can find one key, then they If someone can find one key, then they could easily figure out more keys.could easily figure out more keys.DeCSS Decrypting CSSDeCSS Decrypting CSSReverse engineered Xing’s DVD player Reverse engineered Xing’s DVD player to find one unencrypted key.to find one unencrypted key.Used knowledge of this key to find Used knowledge of this key to find approximately 170 keys that function.approximately 170 keys that function.Distributed the source code.Distributed the source code.The future of DeCSSThe future of DeCSSIt’s out there, both the source and the It’s out there, both the source and the binaries.binaries.The genie is out of the bottle, and you The genie is out of the bottle, and you aren’t going to get it back in. aren’t going to get it back in. 33 www.opendvd.org is having a contest to www.opendvd.org is having a contest to see who can best proliferate/distribute see who can best proliferate/distribute DeCSS.DeCSS.ResultsResultsYou can watch DVD’s in Linux.You can watch DVD’s in Linux.DVD Ripping programs. DVD Ripping programs. DVD movies can be extracted and their DVD movies can be extracted and their digital contents duplicated.digital contents duplicated.The future of DVD’sThe future of DVD’sThe motion picture industry is afraid of The motion picture industry is afraid of people pirating their content, and may pull people pirating their content, and may pull away from DVD’s as a standard.away from DVD’s as a standard.The DVD standard may change. You might The DVD standard may change. You might not be able to have computer DVD players.not be able to have computer DVD players.Intel has said that they are working on a Intel has said that they are working on a technology that will allow a signal to be technology that will allow a signal to be encrypted all the way up to the display.encrypted all the way up to the display.44Ethical IssuesEthical IssuesPiracy of DataPiracy of DataReverse EngineeringReverse EngineeringFreedom of speechFreedom of speechPiracy of DataPiracy of DataCSS does not prevent the copying of CSS does not prevent the copying of DVD’s.DVD’s.Bit-for-bit copies can be made.Bit-for-bit copies can be made.Display can always be captured.Display can always be captured.People have the right to make copies of People have the right to make copies of media they purchase for their own media they purchase for their own personal use.personal use.Reverse EngineeringReverse EngineeringReverse Engineering is legal.Reverse Engineering is legal.Done with computer BIOS and held up in Done with computer BIOS and held up in court.court.Connectix Virtual Game Station was ruled Connectix Virtual Game Station was ruled to be legal.to be legal.Digital Millennium Copyright Act “Makes it Digital Millennium Copyright Act “Makes it a crime to circumvent anti-piracy measures a crime to circumvent anti-piracy measures built into most commercial software” built into most commercial software” 55Freedom of SpeechFreedom of SpeechThe lawyers have attempted to quell The lawyers have attempted to quell pages that link to other pages pages that link to other pages pertaining to DeCSS.pertaining to DeCSS.Courts ruled that freedom of speech Courts ruled that freedom of speech should not be held up because the should not be held up because the DeCSS it involved “stolen trade secrets”DeCSS it involved “stolen trade secrets”ConclusionsConclusionsThere are other means of copying DVD’s There are other


View Full Document

DARTMOUTH COSC 099 - DVD DECRYPTION

Download DVD DECRYPTION
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view DVD DECRYPTION and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view DVD DECRYPTION 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?