In 1980 Martin Hellman described a cryptanalytic time

advertisement
CS 265
Lecture Summary- Nov 6th
Digital Rights Management
CS 265
Cryptography and Network Security
Submitted To
Dr. Mark Stamp
Submitted By
Lakshmi Vempati
Tuesday, 11th November 2003
Page 1 of 4
CS 265
Lecture Summary- Nov 6th
“DRM is recognized as a complex and critical aspect of the lifecycle of a digital object.” [2]
Introduction
“DRM represents a fundamental agreement between the content provider and content user.”
[2] Digital rights Management technologies allow the owners to control their intellectual
property assets such as digital documents. They provide remote control on the digital
objects. DRM systems provide persistent protection, which means protection against
duplication of the object will be maintained even after the object has been delivered. [1]
The protection can be summarized into the following four levels.
 Honor System
Charge for the content on a pay-per-view basis: This did not prove to be a good
solution as the percentage of paid viewers decreased drastically. These systems
rely on the people who honor them.
 Minimal Software based Protection
Restrict the content from the people who can not break the minimal protection:
Though most DRM systems provide this kind of protection, even this did not
prove to be a good solution. Screen capturing could break the security here.
These systems rely on naïve users.
 Maximal Software-based Protection
Achieve controlled execution: This is a higher level of protection where
breaking a security is very complex. Though this is a better solution, there are a
very few such software-based DRM systems available. Implementation of such
a system is very complex.
 Tamper-resistant Hardware
Bury the key in Hardware: This is the highest level of security which can not
be broken easily. Even this system has a problem of users not having access to
what they want to do with their system. [1]
Cryptography alone doesn’t solve the problem of DRM. The cryptosystems work well if
the key can be protected. In the case of DRM, the underlying cryptosystem needs to
transmit everything to the intended recipient that is the algorithm, the cipher text, and the
key. The basic problem here is the communication of key between the sender and receiver.
Once the key is compromised, the security is broken. Also, reverse engineering the
software that contains the key could get the attacker to access the key. For persistent
protection, the reverse engineering process should be very difficult to implement. [1]
Current State of DRM:
Security by Obscurity:
“The strongest security measures currently available for DRM rely on “security by
obscurity” as opposed to any sound theoretical basis.”[1] Some systems entirely depend on
honor system by giving a false sense of security to those who rely on the system to protect
valuable content. [1]
Page 2 of 4
CS 265
Lecture Summary- Nov 6th
Secret Design:
“Perhaps due to their reliance on weak or nonexistent security measures, DRM companies
are reluctant to make details of their systems public. In DRM there is, as yet, no such
imperative to make the workings of systems, even in a general form, available for scrutiny.
At the very least, this tends to suggest that the level of security actually provided by current
DRM systems is suspect, since those making the security claims have a financial interest in
boosting their perceived level of security.” [1]
MediaSnap’s DRM System:
This system was designed to protect PDF documents, though the same principles can be
applied to the protection of other digital objects. With a SDS (secure document server) and
a PDF-plugin, this system achieves the intended security. This system implements the
security measures that prevent attack at all levels. The sender sends the document
encrypted with the session key to SDS and the server applies desired level of persistent
protection and sends the secured document to the intended recipient. The receiver can open
the secured document with the help of a plugin. [1]
At a high level, the DRM system can be viewed as consisting of two layers of
protection, with various other security features built around these layers. At the
outermost layer, the compiled code is encrypted and an anti-debugging technique is
employed. While not invincible, the combination of these two features provides
significant protection against all but dedicated attackers. [1]
The second layer of protection includes a variety of security mechanisms, including
standard encryption, proprietary key management techniques and non-standard
scrambling of the data. These combine to make a challenging reverse-engineering
problem once the outer layer of protection has been penetrated. [1]
Mediasnap’s DRM system also provides the following security features:
 Sophisticated tamper checking of software modules: This ensures that only the
expected code is actually running.
 A low level anti-screen capture technique: This is to prevent the most obvious attack
on digital documents.
 Watermarking: This is to give some chance of post-theft prosecution.
 Make each version of the software unique: This is to prevent the breaking of entire
system if one system has been compromised.
Conclusion:
“DRM represents a fundamental agreement between the content creator and the content
user. Development of a successful DRM model to meet R&E (Research and Education)
requires the active engagement of R&E community - content creators,
publishers/distributors, repositories and content users.” [2]
Page 3 of 4
CS 265
Lecture Summary- Nov 6th
“If DRM is to be successful in software-based systems, perhaps the best hope lies in the
realm of software uniqueness. If each instance of a particular DRM software product
includes some degree of uniqueness then an attack that succeeds against one will not
necessarily succeed against.” [1]
References:
[1] Digital Rights Management: The Technology Behind The Hype, Mark Stamp,
Journal of Electronic Commerce Research, Vol. 4, No. 3, 2003
http://www.csulb.edu/web/journals/jecr/issues/20033/paper3.pdf
[2] Federated Digital Rights Management - A Proposed DRM Solution for Research and
Education, Mairead Martin, Grace Agnew, David L. Kuhlman,
John H. McNair, William A. Rhodes, Ron Tipton, July/August 2002
http://www.dlib.org/dlib/july02/martin/07martin.html
Page 4 of 4
Download