Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

HDCP Break Proven 220

zavyman writes: "I just noticed at Cryptome that the flaws in HDCP posted to Slashdot earlier this year, which one person refused to disclose due to possible threats from the DMCA, have been made public by different authors. Scott Crosby of Carnegie Mellon University, Ian Goldberg of Zero Knowledge Systems, and Robert Johnson, Dawn Song, and David Wagner of UC Berkeley have published a formal cryptanalysis of the High-bandwidth Digital Content Protection System that proves its fatal flaws. Interesting reading for those with some background with cryptanalysis."
This discussion has been archived. No new comments can be posted.

HDCP Break Proven

Comments Filter:
  • Bail money (Score:5, Funny)

    by nbvb ( 32836 ) on Monday November 19, 2001 @10:38PM (#2587748) Journal
    I guess this means we need to start pooling bail money then, huh?

    --nbvb
    • Re:Bail money (Score:2, Insightful)

      by trilucid ( 515316 )

      Funny, yes, but rings sadly true. My guess is that it won't be long before the boys in black pay these fellows a visit for a friendly chat. I can't say how much the fact that this scenario is likely disgusts me.

      I read the cryptanalys, and although I don't pretend to competely understand the concepts contained therein, it was nonetheless very interesting, and IMHO valuable, information (bad grammar there?).

      Here's a question that comes to mind related to all the legal ramifications of this disclosure. I hate to say it, but I somehow got the impression during the start of the whole Dmitry thing that it was easier for the Feds to go after him because he is Russian. In the case of these guys, however, they don't have that added bit of leverage in the public eye. These individuals are all highly respected members of the cryptography community, and have strong ties to universities here in the States.

      I get the feeling that legal action taken toward any of them would generate a FAR greater public outcry than we've seen with Dmitry. I'm not saying this is right or fair AT ALL, but at least it might buy some leverage in favor of true justice. Then again, under true justice people wouldn't be prosecuted for such "crimes" to begin with :(.

      I can't decide how to feel. On the one hand, I have an insane degree of respect for them for publishing their research, and on the other I still have many fears for their freedom.

      Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
      Yes, this is my protest to the sig char limit :).

    • Re:Bail money (Score:5, Insightful)

      by trilucid ( 515316 ) <pparadis@havensystems.net> on Monday November 19, 2001 @10:59PM (#2587799) Homepage Journal

      One more note: it's sad how this nation (the U.S.) finds locking up scientists for publishing their research acceptable.

      If seems awfully close to the practices of the old U.S.S.R. People can call me an extremist all they want for having this view, but many of the Iron Curtain policies don't seem so alien anymore. We lock up scientists, have mass media monopolies that manipulate the masses, and recently massively expanded "police powers" in government. Seems pretty nasty to me. For all those who think the recent intrusions upon civil liberties are "only temporary during our nation's hour of crisis", history shows us differently.

      BTW, if you're gonna reply, please be polite. If you're gonna email, use my public key. Thanks.

      • Re:Bail money (Score:5, Interesting)

        by renehollan ( 138013 ) <<ten.eriwraelc> <ta> <nallohr>> on Monday November 19, 2001 @11:30PM (#2587862) Homepage Journal
        If there's one good thing about the present insanity, it shows how easily such things can come about.

        No longer can we redicule the Russian people for "letting" Communism happen, or citizens of 1930s Gernany for accepting Nazi rule.

        We are as blind and "foolish" as they were.

        Rather humbling, I think.


        • Wow, that does make one think. You're absolutely right... our nation has a bad habit of frowning down upon other governments (throughout history) and their people as being stupid, evil, or confused. It would seem the coin truly does have two sides.

          Moderators, mod parent up! In the words of the /. FAQ, the parent post is "a true gem", IMHO.

          Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
          Yes, this is my protest to the sig char limit :).

        • Re:Bail money (Score:5, Insightful)

          by TGK ( 262438 ) on Tuesday November 20, 2001 @12:18AM (#2587984) Homepage Journal
          The German philosopher and author, Adorno, had some sage words on this topic. He argued that Facism was the outgrowth of a people with so fragile an ego that they lost the ability to belive in their capability of judging for themselves what was right and wrong. Adorno argues that when this happens we allow demagauges (sp?) to make those judgements for us, and the result is the concentration of an enourmous amount of power in the hands of a very very very few.

          His argument can be expanded to deal with almost all forms of oppresive government. Bolshivism, Nazism, Maoism, to say nothing of the numerous military dictatorships the world over (yes, these count too. If the entire country decides that a ruler is just an asshole and that opposition is the only option, he will fall), all of these rely on their implicit ability to define right and wrong.

          Are we letting big buisness and other corrupt hyper-capitalist interests define that for us? It's a question left up to history to decide, but I'm not above saying that it scares me sometimes.
          • Re:Bail money (Score:3, Insightful)

            by Hobbex ( 41473 )
            His argument can be expanded to deal with almost all forms of oppresive government. Bolshivism, Nazism, Maoism, to say nothing of the numerous military dictatorships the world over (yes, these count too. If the entire country decides that a ruler is just an asshole and that opposition is the only option, he will fall), all of these rely on their implicit ability to define right and wrong.

            Don't forget organized religion...
        • Unlike a totalitarian state, we can still fix this one non-violently.

          We still have the right to vote out those that are violating our liberties.

          If enough people are made to care and support liberty, then we can elect pro-liberty leaders and make the USA more free.
      • Example of US scientist being locked up for publishing their research?

        I guess places like slashdot don't count as manipulating peoples opinions and thoughts (open source first post!!!).

        And while I am against most increases in anything government related, I am for many of the new "police powers" (such as wire-tapping--they are outdated laws).

        Scott
        • It's bad enough that the fear of jail time prevents people from publishing, as happened in the main article. Next it'll stop them from researching this. . .

        • Let me see if I understand you correctly... you are in favor of allowig the government to eavesdrop on your private communications *without* a warrant or true just cause? In case you weren't aware, given the recent expansion of police powers in the U.S., "just cause" now has a very loose definition.

          Slashdot is like any other information source... you can take or leave whatever you like. The mass media conglomerates in America are QUITE different; community feedback and participation are only performed under the guise of cheap "we care about our viewers/listeners" stunts. Everything is pre-digested so Joe Sixpack can suck it into his brain with minimal effort. To illustrate: Slashdot is full of posts deriling the editors for being wrong, overly biased, etc. When was the last time you saw a CNN anchor reading viewer letters about how much he/she sucks on the air? Slashdot isn't designed to limit expression in the same way (well, unless you consider the moderation system evil, as some do).

          Don't worry, your desired examples of citizens being locked up for releasing research will be forthcoming shortly, if my guess is correct. Sadly, we've already jailed Dmitry, who IMO definitely counts as "a scientist presenting his research". From what I can gather, lots of foreign groups and even entire nations aren't very happy with us for that. Of course, since we're the U.S., we can just barge onto the world scene and do whatever we like, right? Sure thing, no problem. That won't last forever, rest assured.

          Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
          Yes, this is my protest to the sig char limit :).

          • Let me see if I understand you correctly... you are in favor of allowig the government to eavesdrop on your private communications *without* a warrant or true just cause? In case you weren't aware, given the recent expansion of police powers in the U.S., "just cause" now has a very loose definition.

            No, I'm in favor of being able to get wiretap permission for a person, and then be able to tap cellphone, fax, phone, etc without having to go through more redtape.

            To answer your second point, I've NEVER seen a CNN anchor reading letters about how much they suck. On the other hand, I see O'Reilly doing that EVERY DAY. MAybe that's why O'Reilly is the most popular news person in America now, overtaking the boring Larry King. And once again, SUCH intellectual elitism sickens me..."Joe Sixpack". I'm glad you're so much better than everyone else "Slashdot Geek Nerd Dork". I don't like giving labels like that to people, simply because I feel that somehow I'm better than they are.

            Well, we'll see about scientist being locked up--I'm not buying the hysteria. Dmitri IMO was DEFINITELY not a "scientist" he made a commercial program specifically designed to circumvent copyprotection laws. In other words, he was making money off of selling pirated goods, indirectly.

            Scott

            • Re:Bail money (Score:3, Insightful)

              by trilucid ( 515316 )

              And once again, SUCH intellectual elitism sickens me..."Joe Sixpack". I'm glad you're so much better than everyone else "Slashdot Geek Nerd Dork". I don't like giving labels like that to people, simply because I feel that somehow I'm better than they are.

              Wow, guess what? I consider myself a "Joe Sixpack" who happens to know how to code Perl. Funny, eh? Before you snap out with clever knee-jerk reactions, you might want to consider alternate meanings.

              The term "Joe Sixpack" is generally used to denote the average consumer or products/services/information. Now, I *do* know that I am, to a degree, a bit better informed compared to the average citizen about a range of issues. Does this make me a "better person"? Fundamentally, no. It does, in many respects, make me a smarter consumer. Knowledge is available to anyone who wants to learn. A lot of people make a conscious choice to stay in the dark, and that I can't help.

              Dmitri IMO was DEFINITELY not a "scientist" he made a commercial program specifically designed to circumvent copyprotection laws. In other words, he was making money off of selling pirated goods, indirectly.

              Geez, you're off the deep end with that one. How do you define "scientist"? I think it's pretty clear that the term "computer scientist" could VERY WELL be applied to Dmitry, given the fact that his focus was largely on core research and not just coding. You're a bit misinformed concerning the issue of "piracy promotion" as well; please tell me how people with sight disabilities are supposed to access an Adobe E-book? Is that silence I hear?

              The whole point of the "copy protection circumvenstion" was to allow for FAIR USE OF DIGITAL MATERIAL. Thank you.

              Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
              Yes, this is my protest to the sig char limit :).

              • Wow, guess what? I consider myself a "Joe Sixpack" who happens to know how to code Perl. Funny, eh? Before you snap out with clever knee-jerk reactions, you might want to consider alternate meanings.

                I apologize if your intent came across wrong, however I find that so many people in slashdot truly buy into the "we're a technological elite who knows better than everyone else" idea, and it certaintly seemed that that was what you were talking about. When you talk about "Joe Sixpack" in the third person, it automatically seems derisive, and that you are separating yourselves from "them". If this is not your intent, again, I apologize.

                I would say Computer Scientist and computer programmer aren't the same thing. I'm getting my C.S. degree now, with a good bit of programming experience before taking any classes--just so you know where I'm coming from. As for Dmitri himself as a scientist or whatnot, I don't know--did he publish papers? I honestly don't know--I hadn't heard the issue of him as a research scientist come up.

                I don't know how people with sight disabilities are supposed to access an Adobe E-book? Maybe they should have bought a largeprint version instead, or complained to adobe or the bookmaker about this. this is a VALID complaint. Unfortuantely, I think both you and I know that 99% of the uses of a programs such as the one Dmitri wrote would not be for such valid reasons. SHOULD e-books be available for ppl with such disabilities as you cite? Yes. Should a GENERAL purprose warez type cracking tool be marketed for just this reason? I personally don't think so.

                Actually, how is reading reasons a valid concern? Can't you use E-books on a computer?? THey don't have to be on one of the specialized e-book readers, right?

                Scott

                • As for Dmitri himself as a scientist or whatnot, I don't know--did he publish papers? I honestly don't know--I hadn't heard the issue of him as a research scientist come up.

                  Dmitry Sklyarov is a PhD candidate doing his doctoral thesis on e-book security. I think he qualifies as a computer scientist.

                  And I don't think whether he made a commercial product out of his research is pertinent in any way, shape or form. Considering the situation behind the RSA patent and subsequent 17 year encryption monopoly that ensued from "pure" research why can't Dmitry and some fellow programmer make some money?

                  I don't know how people with sight disabilities are supposed to access an Adobe E-book? Maybe they should have bought a largeprint version instead, or complained to adobe or the bookmaker about this. this is a VALID complaint. Unfortuantely, I think both you and I know that 99% of the uses of a programs such as the one Dmitri wrote would not be for such valid reasons. SHOULD e-books be available for ppl with such disabilities as you cite? Yes. Should a GENERAL purprose warez type cracking tool be marketed for just this reason? I personally don't think so.

                  Such a utility is legal in Russia. That's all that matters. The Russian company sold it on a server in the US. That was illegal under the DMCA. This is a business matter that should have been settled in civil court. Not by some malicious, trumped up criminal charges.

                  And you may categorize it as a warez tool but I see it as an extremely useful tool to evaluate a vendor's product. The company I work for wants to sell content on the Internet using secured documents. A vendor wants to charge us nearly a quarter to half a million dollars for a solution that is based on using "secure" pdfs. My CIO was unaware of how bad the security is with pdfs and with the Advanced E-book processor we can verify the vendor's claims and determine how much this security they are charging us a premium for is actually worth.

              • And let's not forget the veiled threats the RIAA made if the SDMI's flaws were presented in public. Add to that the aborted prosecution of Phil Zimmerman a few years ago. Oh yeah, and Dmitri, as I recall, wrote his software in Russia, not the U.S. He just had the bad luck to be visiting this country when he was arrested. That would be like being arrested in a foreign country while you're on vacation for having written a book in the United States that was illegal in the country you were vacationing in.

                And I don't think I've ever seen any strong opinion of any kind expressed on CNN. Bruce Morton sometimes has pieces that approach something that might resemble an editorial, but he always stops short of taking a position. I always get the feeling that he wants to, but he never does. I wonder if management forbids him from doing so. Wouldn't surprise me. I long for the days when we at least had John Chancellor doing his commentary on NBC. It wasn't much, but it was better than the bland crap people are getting these days. Thank God we have sites like Slashdot. Even if I don't agree with all the posters here, at least I know that most of them are using their brains. If there is any time we need more of that, it's now. We don't have to agree all the time, or even most of the time. It's the debates that matter, and a willingness to listen to alternative viewpoints and to be open to the possibility that those with opposing views have valid points and something constructive to say.

              • The term "Joe Sixpack" is generally used to denote the average consumer or products/services/information. Now, I *do* know that I am, to a degree, a bit better informed compared to the average citizen about a range of issues. Does this make me a "better person"?
                It makes you a NON-Joe Sixpack...
              • The whole point of the "copy protection circumvenstion" was to allow for FAIR USE OF DIGITAL MATERIAL.

                You would be more accurate saying, "The whole point of the 'copy protection circumvention' was to allow for the kind of activities that we became accustomed to under the old-style 'fair use' rules."

                Not that I agree in principle with with what happened to that Russian programmer, but as I understand it, it was all done by the book. It just so happens that the book has sunk to new lows.

                "Fair use" of digital media is a shadow now, trumped -- legally -- by the DMCA. "They" passed a law that lets the publisher remove your right to manipulate things like e-books in certain ways. As a consumer AND a publisher I think it sucks, but it's the law of the land until a court overturns it, and that isn't going to happen without a high-profile case.
            • Wiretap (Score:2, Informative)

              by Ian Peon ( 232360 )
              No, I'm in favor of being able to get wiretap permission for a person, and then be able to tap cellphone, fax, phone, etc without having to go through more redtape.


              OK, scenario for ya: I work in a small office (25 people) and one of them is a subject of an investigation. When you pick up the phone anywhere in our office, the phone system grabs the next free line. That means that the FBI will be listening to ALL CALLS into and out of our office because this person may be using that phone. The legislation does not limit this! There was a Senator (can't remember the name, can't find it on Google) who had wanted to add that the tap was not allowed to be monitored if the suspect was not on the phone at the time, but this got shot down.


              Another question is how often does a suspect use a phone before it's wire-tapped? Should we expect all public to be tapped? If I throw a party and a friend-of-a-friend makes a call or two to order a pizza, should I wonder if my phone is now tapped?

              • Should we expect all public to be tapped?
                Apparently my government monitored all telephone calls in the neighbouring country of Papua New Guinea using a system called Echelon, and complained bitterly and publicly that it didn't work when they didn't find out that PNG had employed mercenaries to put down a revolt. Needless to say, the system isn't secret anymore.
            • Well, we'll see about scientist being locked up--I'm not buying the hysteria. Dmitri IMO was DEFINITELY not a "scientist" he made a commercial program specifically designed to circumvent copyprotection laws. In other words, he was making money off of selling pirated goods, indirectly.

              And Dimitri doesn't have blue eyes because he owns yellow sneakers.
              His work on the eBook decoder is most definetly computer science (cryptology). He's therefore a computer scientist. Regardless of what the software is used for, he is certainly a scientist. Now you might want to call him a 'rogue' scientist, but that's another issue.

              Don't try to say that because you work outside of the law (Galileo) you aren't a scientist. And more importantly, what he did isn't illegal in Russia...

        • Re:Bail money (Score:2, Interesting)

          by dachshund ( 300733 )
          Example of US scientist being locked up for publishing their research?

          No US scientists have been locked up for publishing their research. Many are at risk for such criminal action, and face the prospect that they could go to jail under the current law, if they publish their research.

          To make the possibility excruciatingly clear, the US gov't has locked up a Skylarov, a Russian programmer/researcher under these laws. Some have attempted to argue that his case is "different" because he sold his information (outside of the US, incidentally), or because he's not a US citizen. This does not change the fact that under US law he would be equally vulnerable were he a respected US academic doing legitimate encryption research for no financial gain.

          Given all of this, it seems somewhat mindless to demand that a few US scientists get themselves tossed in jail-- or sued out of existence-- before we start taking the problem seriously. Most researchers have no desire to run the risk, and have instead chosen to withdraw their findings and keep their heads down. I'm not sure why this is a position you would defend.

        • No, they didn't get as far as putting Prof Felton of Princeton University in jail, but not because of good intentions. A threatening letter was sent to him warning him of criminal charges that could be filed against him if he presented a particular paper at a conference (the paper that analyzed various water marking technologies). He chose not to present that paper because of these threats. The case has continued to evolve and now those thugs who were so quick to send threatening notes are claiming there was nothing to it.
      • If seems awfully close to the practices of the old U.S.S.R.
        It looks like the US is getting 1930's USSR problems and the ex-USSR is getting 1930's US organised crime problems.

        Either place has problems, come to Australia, just don't come by boat or we'll push you back out to sea! And if the US gets restrictive communications laws we'll try to draft some that are even more restrictive!

        Currently encyrption is not restricted here (which has enabled Australians and New Zealanders to work on such things as SSLeay while those in the US could only watch due to the threat of imprisonment), but laws have been proposed in the past, and will probably resurface in two or three months when the government gets back to work.

      • The trend to weaken and eliminate tenure at state universities. If the teachers can be removed they will no longer be independent. The politics of funding at uninversities is bad enough as it is. The demise of tenure will be the demise of accademic freedom and as our teachers will have muzzles.

        Stalin and Hitler screwed their accademic communities for politics and it nearly ruined them. It can be argued that both geared their artists to propaganda and their science to warfare but failed. Hitler made good weapons for a while, but was unable to develop high altitude long range bombers and nuclear weapons. Stalin had tanks and planes designed from prison. As good as those designs were, they were not as good as US. While some of the failure of Soviet agriculture was intentional, who can say what effect Stalin's wierd insistence on evolution of individuals had?

        Will the US be next? The DMCA is only part of the picture. When you can't say what you think, you can't trust anyone and therfore don't know what to believe ever. If you can't trust your teachers because they are afraid of being fired, what do you really know? Such distrust of your neighbor is central to autocatic control. Beware of people who scoff at things "un-official" and recomend central control.

      • Re:Bail money (Score:3, Interesting)

        by JWhitlock ( 201845 )
        One more note: it's sad how this nation (the U.S.) finds locking up scientists for publishing their research acceptable.

        Who has been locked up for this? Oh wait, no one has. Yeah, someone else was locked up because their company was selling a product based on breaking a US law, but no one has been arrested for this.

        You can say "CORPORATE POLICE STATE!" all you want, but the fact is, this particular law is awful, one guy has been sent to jail, and there's been at least one court case so far which has affirmed that corporate interests do not outweigh free speech. Like every other horrible anti-speech law that has been passed in the last few years, it will die a slow death. People will be prosecuted under it, sure, but that's the only way to start the chain of events that leads to the Supreme Court striking the ugly thing down.

        This isn't goverment thugs defending their interests. This is government employees doing their jobs, and scientists taking a moral stance, and the American legal system taking it's slow, painful path to justice, same as it ever was.

        Yeah, democracy is the worst form of government, except for all those other forms which have been tried from time to time. Support the EFF, dammit!

        • Re:Bail money (Score:3, Interesting)

          by trilucid ( 515316 )

          It isn't so much the actual current lockups (1 to be precise) that matter the most. It's the fact that countless researchers are probably wondering if they should ever publish their research again given the specter of arrest and lengthy imprisonment. I find it hard to believe you consider Dmitry to be nothing more than a "salesman pitching his product". In truth, his presentation in the States was more to do with findings of fact concerning his research into the system than anything else. The documents are all online, please check your sources.

          No, I'm not screaming "Corporate polic state!". I'm actually screaming "Screwed up crap in the legal code!" which is quite different. The fact that you find it acceptable for innocent people to get their lives ruined in the "short term" (explain that to their families) over this is somewhat galling.

          As for government employees doing their jobs, do we really have to go into the nasty details of other government employees "just doing their jobs"? Harsh example here, but I'm fairly sure a number terrorists groups (meaning their individuals actually doing the dirty work) are confident that they are (1) just doing their jobs, and (2) morally correct for doing so. It doesn't make it RIGHT.

          As for supporting the EFF, according my bank statement I do that on a routine basis. Have you contributed recently?

          Web hosting by geeks, for geeks. Now starting at $4/month (USD)! [trilucid.com]
          Yes, this is my protest to the sig char limit :).
          • Yeah, I'm truly upset over what happened to Dmitry. From what I read of his talk, he was presenting research facts. From what I read of his arrest, he was arrested because his company sells software that is used to break U.S. law. It sounds like the same tactics used when Al Capone was put in jail for tax evasion. It's even worse because, even though these kinds of sacrifices are necessary to overturn a bad law, Dmitry didn't really have a chance to decide that he wanted to help American democracy get it's act together.

            There are two ways to fight bad laws. The first way is to have elected representatives repeal the laws. Not damn likely, when the people that like the laws are the same ones who are paying for campaign ads.

            The second is civil disobedience. I'm proud of any scientist who is willing to go against this law. It would be even more effective if the IEEE or other professional groups spoke out against the law. It would be even more effective if those groups told it's members to break those laws openly and publicly, and millions did it, and millions of tech workers were put in prison for it. However, I doubt tech workers (or even Slashdot readers) have that kind of code of ethics. I know I'd have trouble doing that, especially since I'd have no guarantees others were doing the same.

            I laughed when a friend told me she was taking an "ethics for engineers" class. How ridiculous - what ethical questions do engineers have? Then I read the textbook, and realized that there's a big hole in CS and engineering education. For instance, I had no idea that, as long as certain criteria are met, a whistle blower that exposes fraud in a government contract is entitled to a portion of any settlement or judgement against his or her employer. I also learned how long a fraud conviction takes, and the personal cost involved, and had to think about what I would do in a similar situation.

            I'm proud of these scientists. It sucks, but I hope they go to jail or get fined, and the wheels of justice move swiftly. Yes, I support the EFF. I gave them a chunk of G.W.'s tax rebate, and as soon as I get my damn hat, I'll probably give again.

    • I was actually in that ACM workshop [star-lab.com], in which this paper was originally published. There was some discussion, does the presentation violate DMCA,and the general conclusion was, that it doesn't. The reason is that in this case 17 U.S.C. 1201(g)'s encryption research exception [doc.gov] clearly applies. Totally another question is, does it also protect ACM and other any other third party, which decides to publish the information. If we believe Judge Kaplan, it doesn't..

      The difference between this and Felten case is, that Felten "cracked" watermark system, which isn't encryption per se. Stupid, eh?



      V.

      • Hmmm indeed. That's very nice, but completely ridiculous at the same time; this section of the DMCA states that it is legal to perform encryption research in certain cases, while (IANAL) the whole point of the DMCA was to prevent this research... this law is starting to make less sence every day. O wait... it didn't make sense in the beginning. I guess wether this section applies or not is totally up to the randomness of justice in the USA nowadays.
  • Some people have refused to make security problems bublic, thus weakeneing the security of HDCP (someone could have fixed it), and this works against the *AA media bunches. Ah, the irony of it....
  • This is fabulous work and points out the flawed approach of expedient development of crypto based products in a corporate environment.

    Good crypto can only be developed in the open where it is subject to formal peer review and detailed scrutiny.

    One of these days, this problem will solve itself when shareholders regject propriatary approaches becuase they don't work, are borken and don't make any money.

    Shareholders need to be educated that the only way to make money of cryptographicaly protected products or information is the open way.

    RGR
    • I was about to say the same thing...until they brought up that conjecture that the use of certificates to authenticate each device's public key probably won't hold up. And they're right, provided the certification algorithm isn't decided yet (which makes it vulnerable).

      I would have accepted this paper a bit better if they had worked on a proof to support their conjecture.
      Otherwise, they had a good proof on this system's vulnerabilities, provided no certs are involved.
      • The conjecture was a method presented as a partial fix for the cryptography product.

        It still has admitted failures.

        However, it avoids the failures that require the ability of the attacker to spoof valid credentials

        Most importantly, it was presented as the underlying method that may be the implementation of another, as yet unavailable, closed standard.

        Of course... they should prove that *sarcasm*.

  • In Summary... (Score:2, Redundant)

    by FreezerJam ( 138643 )

    In summary...

    Conclusion

    HDCP's linear key exchange is a fundamental weaknesses. We can:

    • Eavesdrop on any data
    • Clone any device with only their public key
    • Avoid any blacklist on devices
    • Create new device keyvectors.
    • In aggregate, we can usurp the authority completely.

    Why do people continue to think they can build a secure system designed to simultaneous distribute data publicly and prevent its distribution?

    • by Bryan Andersen ( 16514 ) on Monday November 19, 2001 @10:54PM (#2587787) Homepage
      Why do people continue to think they can build a secure system designed to simultaneous distribute data publicly and prevent its distribution?

      They belived a salesman. They don't know how get independent verification. They don't do the needed research. They... OOooo! a shiny object.

    • Re:In Summary... (Score:2, Insightful)

      by DMouse ( 7320 )
      > Why do people continue to think they can build a secure system designed to simultaneous distribute data publicly and prevent its distribution?

      Why? Because there is a lot of money on the table to anyone who can claim to have succeded.

      You and I both know this is actually impossible. What really needs to happen is that the manufacturing companies need to realise they are in the business of creating intelligence (going back to the definition of intelligence as a signal stream that has information encoded in it), rather than trying to force fit their manufacturing mind set onto the internet.

      By this, I mean that all the music companies should admit that distribution of mp3's et al is now, for better or worse, close enough to free to be negligable. They can now stop trying to guess which band is going to be this summer's big hit (and thus mass produce cds, dvds, ...), and instead just release all their archives of data for free onto the market.

      What they get once they have opened the floodgates, is the ability to charge people for finding precise information, and also for subscriptions to new information.
    • They separated key into public and private parts. But I guess they haven't got to the chapter on RSA in Applied Cryptography Handbook, when the design was due. Too bad.
    • Re:In Summary... (Score:3, Insightful)

      by tzanger ( 1575 )

      Why do people continue to think they can build a secure system designed to simultaneous distribute data publicly and prevent its distribution?

      Maybe I'm missing something, but doesn't the DSS television broadcasting system do this already? I mean yes it's crackable now but I believe that by sacrificing some of the bandwidth for content and using it for security instead, it could be made a lot harder to crack than it is now.

      Cloning is going to be next to impossible to fix, yes, but I wonder if you couldn't get around the "wait 6 months for your receiver's "stop" command to stop being sent" by throwing a lot of processing power at it and basically encrypting the stream to every (yes the entire subscribed population) system's public key. Perhaps cloning could be avoided by making the cards smarter and using techniques of self-destruction if the cards detect that they're being tampered.

      I know I'm no cryptographer and it's late for me here, but the idea of having a secure system simultaneously distribute data publicly yet prevent distribution to unwanted systems doesn't seem impossible, just impractical at this point.

      • The DSS system is a bit of an anomaly, because DirectTV controls both the service and the smart-card encryption technology, so that people still do not know exactly how the card functions. In fact, the most popular way to get around paying for a subscription is by emulating the card's basic functions and sending all crypto-related requests to the card for processing.

        In the case of HDCP, the protocol must remain public, so there is no chance for security through obscurity. They must solely rely on the strength of the protocol to cracking, whereas DirectTV has the strong advantage that no one outside the company secrets knows how the cryptography works.

        This is why HDCP has fallen just as easily as DeCSS. Both relied on the security of the private keys, but ignored possible flaws in the protocol itself.
        • In the case of HDCP, the protocol must remain public, so there is no chance for security through obscurity. They must solely rely on the strength of the protocol to cracking, whereas DirectTV has the strong advantage that no one outside the company secrets knows how the cryptography works.

          So, other than the bruising of egos and the computation expense, what is wrong with using RSA/DSA key cryptography instead of some cockamamie homebrew stuff? Those protocols are open (RSA's patent has expired IIRC) and seem to be holding up to cryptanalysis...

  • It would be nice if the content cartels like the RIAA and MPAA would learn to adapt business models rather than rail against their own consumers. They would rather overturn the legal system than risk their established profit system.

    Regards
  • by agdv ( 457752 )
    Oh, good thing it's the video encryption stuff. When I read the headline I thought it would be insecure to get an IP address with DHCP, and that had me worried.
    • Re:HDCP (Score:1, Offtopic)

      by psamuels ( 64397 )
      Oh, good thing it's the video encryption stuff. When I read the headline I thought it would be insecure to get an IP address with DHCP, and that had me worried.

      Ummmm, unless this is a joke (sometimes I'm dense about that), I should point out that DHCP has no security provisions at all. Both client and server have nothing to identify each other with other than name and MAC address, both easily forged.

      From the DHCP server's perspective, you can't keep the clients from claiming any IP they want, so there's not much sense in trying. (Use smart switches or IPSec layers or the once-considered-secure 802.11b for partial protection there.)

      From the client's perspective, you either trust what the server tells you (and yes this can have security implications - if someone can give you a fake DNS server you are open for man-in-the-middle attacks) or you hard-wire everything in.

  • Side effect (Score:4, Insightful)

    by Jucius Maximus ( 229128 ) on Monday November 19, 2001 @11:02PM (#2587809) Journal
    The fact that the original breaker of the code did not want to reveal their specific findings because of the DMCA reveals something interesting that was probably part of the original idea behind the law:

    The DMCA aims not only to protect companies who use crappy encryption from hackers, it aims to hide from the general public the potential dangers of using encryption that could have been deliberately made to be crackable. So the government could release some (easily crackable) encryption standard that gets added to a lot of hardware and software but the people won't know that their privacy could be easily violated because it would be illegal to try to crack the system. This then makes people vulnerable.

    Perhaps I just thought of something that everyone knows already, but I wanted to voice it nonetheless.

    • If the goverment released the system then the spec would be available for study. Remember, the goverment can't hold copyright to anything, but some times the contractors can...
    • The DMCA aims not only to protect companies who use crappy encryption

      I think you may have hit upon a key step in fighting the DMCA: we need to point out that, stripped of all the falderal it is intended to let manufacturers pass shoddy goods off on us poor consumers.

      If only some brave defender of the consumer/voter/masses would come forward to defend us from these cads (say, leading up to an election)...I'll bet the press would love it.

      Remember, lobyists may give money, but they can be sold down the river in a heart beat if someone comes along offering votes.

      -- MarkusQ

    • by Convergence ( 64135 ) on Tuesday November 20, 2001 @12:19AM (#2587989) Homepage Journal
      I broke it over 6 months ago, go look at the cryptome archives, where its been sitting since May 9th.

      I know of at least 4 researchers who have independently discovered the flaws. (See my other slashdot post).

      After Skylarov and Ferguson, I was reluctant to point out that my work had been sitting around on cryptome since May. I suspect Keith Irwin felt similarily.

      Neils wasn't the first to go public or even second, though he did raise a wonderful stink. :)
  • Just in case... (Score:4, Informative)

    by Akardam ( 186995 ) on Monday November 19, 2001 @11:07PM (#2587821)
    Just in case the origonal authors' fears are justified, I've mirrored the page here [akardam.net] [http://lookingglass.akardam.net/mirrored/hdcp-wea kness/hdcp111901.htm for the link wary].

    Mirror early, mirror often.
  • Unbelievable... (Score:5, Interesting)

    by zunger ( 17731 ) on Monday November 19, 2001 @11:29PM (#2587860)
    HDCP uses a linear system for generating the shared secret.

    From a part-time mathematician's perspective (ok, actually a physicist) this was the line that just made my jaw drop. What were they thinking?! If this text is correct, this algorithm may as well have been designed by a high-school student.

    As several people have pointed out already, this is really one of the big threats of the DMCA -- that companies will go around using incredibly poor standards like this, and be immune to any pressure to improve their quality because their customers are legally forbidden to ask what they are receiving. It says a great deal about the present legal climate that anyone could get away with a mess like this cryptosystem in a commercial product.

    *sigh*

    • by mj6798 ( 514047 ) on Monday November 19, 2001 @11:47PM (#2587908)
      Perhaps they didn't realize it was a linear system. Many cryptosystems are broken when someone figures out "but your incredibly complex system is really mostly just doing X", for some well-known mathematical construct "X". Real cryptographers have made similar mistakes in the dim past, although in 2001, it is perhaps a little late for repeating this particular one.
      • But that's irrelevant. They're forbidding non-ignorant people from researching the problem. Just because the mfr does not properly solve the problem, does not mean that they are entitled to prevent other people from pointing this out.
    • Hey, those "poor standards" are keeping my fair use rights intact! In a really crappy de facto way anyway...

      I don't want to see the day when they answer those consumers' question and truthfully tell us that their DMCA protected Digital Shackles(TM) are indeed quite effective.
    • by Convergence ( 64135 ) on Tuesday November 20, 2001 @12:06AM (#2587960) Homepage Journal
      (This is the author of the slides, BTW)

      Intel wanted a scheme that could be implemented in under 10,000 gates. IMHO, the designers were aware of the flaw, though not necessarily of the full impact of the flaw. Some of the attacks are subtle.
  • Having a bit of formal training in Math, I'm just speechless. This is not crypto analisys, this is second semester of Algebra, Quiz question #2.

    Public/Private keys .. blech .. I do not know who designed this, neither I'm not sure if they even cared to independently evaluate it, but this is incredibly and incomprehensibly lame. It's like using XOR encryption or computing hash bytes multiplication.
    • Being someone with a bit of formal training myself, I agree with you that this crypto-system bites as well...after seeing the proof.

      But I have to say as well, the designer(s) probably took a few shortcuts to generate a working specification...like -

      They used a ring that's WAY too small...56-bit keys can be brute-forced within months.

      Then again, the proof doesn't attack this...only the modulus size (40-elt vectors), and that it can be cracked with a heuristic that takes at most 1600 operations.

      They could add more keys to the modulus, but I suspect that it would have made an implementation unworkable...remember that DVD players don't have THAT much computing horsepower.

      Sure it's bad...cause it's been shown to have a polynomial solution...the designer probably knew this already (and if he didn't, you're right...HE IS stupid! ); but he had to produce something...and that is what market-driven SW engineering is all about...it certainly is not comp. sci. ;^)
    • Just because its an algorithm that could be built by a blind monkey given a typewriter doesn't mean that the crack isn't an analysis.

      I'm not disagreeing about its lameness, just claiming that I didn't do a cryptoanalysis. :)

      Also, the slides do elide out a few things, the operations occur in the ring of the integers modulo 2^56, This is a ring, not a field because even numbers to not have multiplicative inverses. You also have to worry about mistakenly assuming that you can construct stronger attacks than are actually provable based on the specification.

      Second semester algebra might be pushing it, but I'd agree that just about any junior in math could crack it in about 10 minutes after pointing out the relevant section of the specification.

      BTW, the designer is Intel. :)
  • by Convergence ( 64135 ) on Tuesday November 20, 2001 @12:13AM (#2587977) Homepage Journal
    There were two versions posted on cryptome, the second (latex2html, much easier to read) omitted this statement the first version had:

    `` The attacks on HDCP are neither complicated nor difficult. They are basic linear algebra. Thus, there have been at least 4 independent discoveries of these flaws. The four I know of are my co-authors, Neils Ferguson, Keith Irwin (http://www.angelfire.com/realm/keithirwin/HDCPAth acks.html), and myself (www.cryptome.org/hdcp-weakness.htm). The last two have been available publically for 3 months and 3 weeks prior to Neils Ferguson's declaration. Neils declaration and the skylarov case were an eye-openeer for me and made fully realize what I had done, and what negative consequences I was in danger of experiencing.

    What wrathful gods one risks angering by a 20 minute straightforward application of 40 year old math. This was an accident, not a habit. Like other researchers, I do not want to be smited and thus do not expect to analyze any more such schemes as long as the DMCA exists in its current form.

    (This statement is my own and does not represent the opinions of my co-authors.)''

    So, for those of you who watch cryptome, I broke it there about 3 days after it was leaked, 6 months ago. Keith Irwin also put his observations up 3 months ago. All of this predates skylarov and ferguson.

    So, this is only the official version of the break, the slides I presented 2 weeks ago.
  • http://censored.firehead.org:1984/hdcp/crack2/
  • HDTV (Score:5, Informative)

    by Ogerman ( 136333 ) on Tuesday November 20, 2001 @12:33AM (#2588004)
    This is pretty basic, but for those who don't know, HDCP is the encryption scheme of choice for HDTV video signals. This is fairly huge news that it has been broken since all TV's and broadcasts in the US will supposedly eventually switch to the HDTV standard. Unless they pull a fast one and switch the standard (which would alienate everyone who has already bought expensive HDTV equipment), this means that DMCA or not, people are going to have guaranteed access to plaintext HDTV signals for as long as the standard is in use. Of course, I'm personally hoping that the DMCA is at least re-written, preferrably scuttled altogether.
    • Re:HDTV (Score:2, Informative)

      by digithead ( 132919 )
      On January 1, 2007 all analog broadcasting in the US is scheduled to cease IF 85% of the homes in the US are capable of receiving digital TV. That's probably a pretty big "if" right now. Especially since the industry can't get it's act together on some of these content protection schemes.

      There are quite a few early adopters who will be alienated by the lack of an appropriate digital interface (DVI or IEEE 1394) on their multi-thousand dollar HDTV. Without this interface their set-top HDTV tuner won't be able to verify that it's allowed to pass on a full resolution digital signal for HDCP encoded content. The result is that most current HDTV owners won't be able to watch full resolution pay-per-view, premium channels and whatever else the networks or MPAA will require be encoded with HDCP.

      Why didn't they buy a set with IEEE 1394 or DVI you ask? Because there basically aren't any available. JVC has one set with DVI, select Mitsubishi's have IEEE 1394 and no set-top boxes have either! Even if you have a set with an appropriate interface, you'll have to replace your box and most of them are still close to $1K. Please, don't even get me started on the problems with the current set-top boxes.

      The cracking of HDCP may futher delay the availability of additional content since the MPAA doesn't want full resolution HD movies being broadcast without it. I just wish the broadcasters, manufacturers and content providers could all just figure this mess out so consumers can start seeing beautiful digital TV. If you haven't seen a full blown HD signal on a properly configured monitor, you're really missing something!

      BTW, don't even ask about the satellite boxes which include code that allows the direct broadcast satellite companies (DirecTV & Echostar) to downrez any program they wish to whatever resolution they choose!

  • What if we had a group of say... 10K people "release" a paper like this.

    I'd love to see them start going down the list :)
  • by streetlawyer ( 169828 ) on Tuesday November 20, 2001 @04:47AM (#2588344) Homepage
    I don't understand what the big deal is. This standard is not being used to encrypt medical records or nuclear missile codes. It's being used to encrypt digital television signals so that it is possible to charge for them. It's been designed for that purpose and to meet certain standards of simplicity which make it possible to use widely without making devices prohibitively expensive.



    For this purpose, it doesn't need to be mathematically valid, any more than a cash register needs to be fireproof and have a 28-digit combination lock. All that a cash register needs is to have a door that closes and stays closed. This means that you can't have things move from the cash register into your pocket by accident.



    If there was a vulnerability in the standard which meant that you could access the signals without trying to, that would be bad news. As it is, the signals are only accessible by those who want to consciously make equipment designed for the purpose of veiwing them, which has no legitimate alternative use. In other words, the "crack" of this standard only refers to an attack which is against the laws relating to theft (in this case the DMCA).



    This is not a "bad" or "stupid" encryption system; it's just an example of a company using the laws which protect them to cut a cost corner. After all, if one could trust people to pay for what they watched, they wouldn't need to encrypt the signal at all.



    For a bunch of self-styled "engineers", slashdot has a really hard time understanding the basic concept of "fit for purpose".

    • This is not quite what it's about.

      The purpose is to prevent the consumer from intercepting the signal between the "set-top-box" and the TV, and doing something useful with it like making a digitally perfect copy of the material.

      Ensuring payment by the consumer is a mechanism already in place - i mean, you've got the set-top-box, haven't you?
    • This is not a "bad" or "stupid" encryption system; it's just an example of a company using the laws which protect them to cut a cost corner.

      I wasn't aware of it being the government's job to help business cut corners and increase profits.

      After all, if one could trust people to pay for what they watched, they wouldn't need to encrypt the signal at all.

      If you're going to send a signal into my home, be it over television airwaves or satellite broadcast, I should be able to do what I like to the signal. I didn't ask for your signal to enter my home. I don't have a contract with you promising to leave your signal alone. By attempting to decrypt your signal, I am not depriving you of use of the signal.

      What ethical right do you have to demand that I don't examine that signal? Sure, there are laws against it, but laws and ethics are different matters.

      By accessing your signal without paying, I am receiving benefit without reimbursing you. Boohoo. Not my problem. My local television stations seem to survive. Adapt to the problem, don't take rights from people to protect existing business practice.

      Perhaps you'll claim that your right to not have your signal decrypted is similar to my right to not have my cell phone calls decrypted. Great argument, except I assume my cell phone calls are being decrypted for exactly the reasons above. I hope that cell phone technology developers are working on better encryption, but ultimately if my cell phone signal is available, I encourage you to go wild.

      • I wasn't aware of it being the government's job to help business cut corners and increase profits.

        Don't worry, numerous universities offer courses in "Law & Economics" which can cure you of this deficiency.

    • >I don't understand what the big deal is.

      The big deal is that you can be sent to PRISON
      for dissemenating this information.
  • Considering Ian Goldberg is probably still a Canadian citizen living in the U.S., he also has to worry about the new anti-terrorism laws.
  • by Global-Lightning ( 166494 ) on Tuesday November 20, 2001 @10:01PM (#2594044)
    Reading the document, the crack hinges on collecting a sufficient number of public keys. The solution is obvious:

    Ban the sharing of public keys!
    Oh, wait...

You are in a maze of little twisting passages, all different.

Working...