Search results for: “aacs”
-
AACS Updated, Broken Again
[Other posts in this series] We predicted in past posts that AACS, the encryption system intended to protect HD-DVD and Blu-ray movies, would suffer a gradual meltdown from its inability to respond quickly enough to attacks. Like most DRM, AACS depends on the secrecy of encryption keys built into hardware and software players. An attacker…
-
Digg Users Revolt Over AACS Key
I wrote yesterday about efforts by AACS LA, the entity that controls the AACS copy protection system used in HD-DVD and Blu-ray discs, to stop people from republishing a sixteen-byte cryptographic key that can unlock most existing discs. Much of the action took place at Digg, a site that aggregates Web page recommendations from many…
-
AACS Plays Whack-a-Mole with Extracted Key
The people who control AACS, the copy protection technology used on HD-DVD and Blu-ray discs, are apparently trying to shut down websites that publish a certain 128-bit integer. The number is apparently a “processing key” used in AACS. Together with a suitable computer program, the key allows the decryption of video content on most existing…
-
AACS: Slow Start on Traitor Tracing
[Previous posts in this series: 1, 2, 3, 4, 5, 6, 7, 8.] Alex wrote on Thursday about the next step in the breakdown of AACS, the encryption scheme used on next-gen DVD discs (HD-DVD and Blu-ray): last week a person named Arnezami discovered and published a processing key that apparently can be used to…
-
AACS: A Tale of Three Keys
[Previous posts in this series: 1, 2, 3, 4, 5, 6, 7.] This week brings further developments in the gradual meltdown of AACS (the encryption scheme used for HD-DVD and Blu-Ray discs). Last Sunday, a member of the Doom9 forum, writing under the pseudonym Arnezami, managed to extract a “processing key” from an HD-DVD player…
-
AACS: Modeling the Battle
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] By this point in our series on AACS (the encryption scheme used in HD-DVD and Blu-ray) it should be clear that AACS creates a nontrivial strategic game between the AACS central authority (representing the movie studios) and the attackers who want to defeat AACS.…
-
AACS: Sequence Keys and Tracing
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the sixth post in our series on AACS, the encryption scheme used for HD-DVD and Blu-Ray discs. It’s time to introduce another part of AACS: the Sequence Key mechanism. Throughout our AACS discussion, we have done our best to simplify things so…
-
AACS: Title Keys Start Leaking
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] Last week we predicted that people would start extracting the title key (the cryptographic key needed to decrypt the contents of a particular next-gen DVD disc) from HD-DVD discs. Indeed, it turns out that WinDVD, a popular software player that runs on PCs, leaves…
-
AACS: Game Theory of Blacklisting
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the fourth post in our series on AACS, the encryption scheme used for HD-DVD and Blu-Ray discs. We’ve already discussed how it’s possible to reverse engineer an AACS-compatible player to extract its secret set of device keys. With these device keys you…
-
AACS: Blacklisting, Oracles, and Traitor Tracing
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the third post in our discussion of AACS, the encryption scheme used for HD-DVD and Blu-Ray discs. Yesterday Ed explained how it is possible to reverse-engineer a player to learn its secret device keys. With the device keys, you can extract the…