HDCP has (apparently) been broken

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • res0nat0r
    Someone MARRY ME!! LOL
    • May 2006
    • 14475

    HDCP has (apparently) been broken

    Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.


    Apparently here is a master HDCP key which can be used to subvert the entire HDCP protection system.

    Paper about how this works here:

    http://www.cypherpunks.ca/~iang/pubs/hdcp-drm01.pdf

    Abstract. We describe a weakness in the High Bandwidth Digital Content Protection
    (HDCP) scheme which may lead to practical attacks. HDCP is a proposed
    identity-based cryptosystem for use over the Digital Visual Interface bus, a consumer
    video bus used to connect personal computers and digital display devices.
    Public/private key pairs are assigned to devices by a trusted authority, which possesses
    a master secret. If an attacker can recover 40 public/private key pairs that
    span the module of public keys, then the authority’s master secret can be recovered
    in a few seconds. With the master secret, an attacker can eavesdrop on
    communications between any two devices and can spoof any device, both in real
    time. Additionally, the attacker can produce new key pairs not on any key revocation
    list. Thus the attacker can completely usurp the trusted authority’s power.
    Furthermore, the protocol is still insecure even if all devices’ keys are signed by
    the central authority.
    If this is true, another DRM system down the drain....
  • res0nat0r
    Someone MARRY ME!! LOL
    • May 2006
    • 14475

    #2
    Re: HDCP has (apparently) been broken



    Looks like this is real...

    It's been just a few days since we broke news of the HDCP master key crack -- a rogue unlocking of the code that keeps HD content under strict control. Now Intel has independently confirmed to both Fox News and CNET that the code is indeed the genuine article. According to company spokesman Tom Waldrop, "It does appear to be a master key," adding that "What we have confirmed through testing is that you can derive keys for devices from this published material that do work with the keys produced by our security technology... this circumvention does appear to work." Coming from the company that developed and propagated the protocol, that's about as clear as you can get.

    Comment

    Working...