Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

Geo-Encryption: Global Copyright Defense? 199

An Anonymous Coward writes: "CIO Insight has a story on the copyright-protection scheme devised by Georgetown professor Dorothy Denning. Geo-encryption uses GPS technology to keep information scrambled until it reaches a precise location anywhere in the world. Denning has started a new company, GeoCodex, to capitalize on the technology." I can't wait for the Crypto-Gram article about this one..
This discussion has been archived. No new comments can be posted.

Geo-Encryption: Global Copyright Defense?

Comments Filter:
  • Dictionary attacks (Score:1, Insightful)

    by Anonymous Coward
    This is a tired old idea. All you need to do to break this scheme is run a dictionary attack using all coordinates. Should take less than an hour on my desktop.
    • Suppose you made it path as well as location depenedent. It'd be a wee bit harder to break.
    • by Anonymous Coward
      The Earth's surface is something like 4*pi*6378000^2 = 5e14 m^2. Assuming that the device doesn't mind a 5m error (15") and assuming that you know the elevation everywhere on Earth (or that the device doesn't care about elevation), that makes 5e12 patches of size 10mx10m to try. And if you start with the most likely country and the most populated area first, then you're likely to find the spot in the first 1/1000 of the patches you try, so that gives a few billion coordinates to try. Breakable indeed.
  • Of course, it has the exact same problem that most copyright protection techniques have. How do you store the location in the media file in such a way that it can't be changed? And how do you prevent players from being manufactured that don't look at the location?

    If these questions aren't answered then it won't prevent even casual copying.
    • How do you store the location in the media file in such a way that it can't be changed? And how do you prevent players from being manufactured that don't look at the location?

      A better question would be 'how many things can really be encoded to be used in only on location'.

      An even better one is 'how obviously on an article should the date 1st April be printed in order to trick the greatest amount of people'?
      • An even better one is 'how obviously on an article should the date 1st April be printed in order to trick the greatest amount of people'?

        Regardless of AFD, most replies so far talk about technical merits of the proposed scheme, and indeed there are some. For example, there are *very many* unique coordinates on Earth, this makes the key quite long. On the other hand, the key is not very random (because most people live on land, and majority of those live in cities). So this makes for an interesting theoretical discussion, even if it is not for real.

      • by kaiidth ( 104315 ) on Tuesday April 02, 2002 @09:29AM (#3269842)
        Do a google search for 'Denning GPS'.

        First hit that comes up is a 1996 paper Location-based Authentication: Grounding cyberspace for better security [georgetown.edu], by Dorothy E. Denning and Peter F. MacDoran. Reading the paper, the idea looks to be that by knowing the location of a computer user one can define whether they are authorised to perform a particular action.

        This makes marginal sense (if somebody who isn't in a bank office is playing with computer codes then they're probably not really permitted to play with them). However, to me this article reads like, 'Hey, if I mention copyright protection, I'll get funding'. And the whole idea reads like that - after all, for the person in the above example to perform an unauthorised action on bank accounts, they must already have broken through the protection placed around the system. Simply adding another authentication isn't going to magically fix that problem (hey, you want me to tell the system I'm in the White House? OK. It's no different to telling the system that I'm Bob, financial manager).

        As for the use of said technology to control music distribution... what?!. If this woman is 'America's Cyberwarrior' then... be afraid. Very afraid. I'm sorry to say it, but whilst there are some very valid uses for GPS technology (something like HP's Cooltown [hp.com] project, mobile computing in general, augmented reality, etc), I don't think this is it.

        On the one side, it's valid to argue that including un-spoofable - if that's a word - location data in all internet communication would help in some cases (finding malicious hackers, absolving the innocent) but given that it also destroys the whole concept of anonymity, it's plain not worth it. Location information has to be optional. This is just another step in the 'media programs phoning home'/WinXP DRM direction, and it's not a good one.

        If I sound irritated, it's because I am; I have no idea what Denning's politics are or whether the spin on this story is merely unfortunate, but the article linked to in this story (somewhat unlike the paper) sounds like something the EFF will eventually find themselves fighting.

        I particularly like the part of that paper marked 'privacy considerations', where they note "The use of location signatures has the potential of being used to track
        the physical locations of individuals."

        Their solution?

        "Access to [this information] should be strictly limited." And, um, "Privacy can also be protected by using and retaining only that information which is needed for a particular application." Or you can "opt-out" of giving your information, although of course "some actions may be prohibited if location is not supplied".

        You mean the MPAA/RIAA are only going to retain as much information on me as they need for marketing purposes, and I can opt out if I don't mind never listening to another RIAA-produced CD? Thank you, Denning and MacDoran.
        • I'm wondering if this idea is even still valid. Assuming it ever was. From the article you linked up:

          The location signature is virtually impossible to forge at the required accuracy. This is because the GPS observations at any given time are essentially unpredictable to high precision due to subtle satellite orbit perturbations, which are unknowable in real-time, and intentional signal instabilities (dithering) imposed by the U.S.

          First off, the SA dithering has been turned off. Presumably that makes GPS signals much more predictable, and could easily trash this whole scheme. I also find it hard to believe that the orbital perturbations of satellites is especially random on the scale which would be measurable. Now that SA has been turned off, most of the remaining error in GPS is due to variations in the temperature and density of the atmosphere between the satellites and the receiver. Since these would often vary between the 'host' and the 'authentication server' that would create wiggle room for a malicious host to guess the right signal. I don't know if it would be possible for them to use the encrypted military signal to correct that error without having the ability to decrypt the military signal. That's an interesting problem.

          The other major weakness I see is the whole idea that the signals are unknowable in real-time. Um, no. A malicious host can use a receiver to measure all the random variations exactly as the authentication server must. I just find it remarkable that anyone who appears to be as smart as Denning could expect this to work. The simple fact is that a malicious attacker will have access to all the same information that the authentication server will use to make it's decision. A hacker can measure the "error" factor in the GPS signal in the exact same manner as the authentication server. They know the equations which the authentication server will use to validate a signal. The transformations you might have to do to the received signal to change the location it represents are going to be simple linear transformations. The math behind GPS is pretty simple really.

          Not to mention this little tidbit: Further, because a signature is invalid after five milliseconds, the attacker cannot spoof the location by replaying an intercepted signature. Well, that will work great for verifying people in the same building. But you're not going to verify telecommuting users who are dialing in, or using DSL, or travelling across the country. Hopefully someday we'll have a network which let's us do things reliably in less than 5ms, but don't hold your breath. Especially since you can only expect light to go about 1000km in fiber during that 5ms.
        • Ms. Denning's qualifications in the field are certainly well known. But... How can the GPS data be part of a trusted blackbox? (Encryption/decryption usually has to take place in a trusted blackbox. Best of all is on a seperate processor, but with proper security, modern processors can wall off processes enough to qualify for B2 qualification -- in ten years!)

          So, what's to stop me from using a device driver for GPS that lies? (I'm in, umm, Hong Kong, yeah, that's that ticket!) Unless GPS has some sort of digital signature, I can't see it.

        • I don't think you get it. The idea is not so much to encrypt movies sent to consumers but rather to encrypt movies sent to theaters. If someone intercepts the data stream for the latest movie their copy will only play at the target theater, so pirate DVDs of that data stream will be worthless. Once the film is in general release this system won't mean much. In other words, this won't replace CBDTPA.

          What got my attention was the idea that they could tap my computer [slashdot.org] to steal my encryption key [slashdot.org], but still couldn't read my plans to take over the world [uni-duesseldorf.de] at their office. They can only be read at my office [duryea.org].

    • by Anarchos ( 122228 ) on Tuesday April 02, 2002 @05:12AM (#3269452) Homepage
      > How do you store the location in the media file in such a way that it can't be changed? How do you prevent players from being manufactured that don't look at the location.

      Because it's encrypted, with the GPS location being the key, or at least part of it. So it's not like you can just ignore a location header and get at the text file: you need to pass your GPS location into a decryption algorithm that will decrypt the scrambled data into a readable file.

      Of course, this can be an additional layer added onto existing methods of asymmetric encryption. As GPS units become more precise, we might even begin to have a "decryption tile" or square in bedrooms so that each resident has their own decryption key accurate to that specific square foot of space.

      Someone stole your laptop? They're going to have to break into your house, steal a key to your room, and stand on your decryption square just to decrypt any of your files. Sounds like an interesting acrobatic scene for Mission Impossible 3.
      • Someone stole your laptop? They're going to have to break into your house, steal a key to your room, and stand on your decryption square just to decrypt any of your files.

        Not to pick holes in this theory, but this will also mean

        'on the move with your laptop? You're going to have to go home and stand on a postage stamp to decrypt that file you've just been sent'

        I can't think of anything stupider than an 'encryption square' in your room. But I'm not trying very hard.
      • they could just supply fake values to the GPS curcit, as could anyone for any purpose. This isn't encryption, its a farce. (and suppose this could be made to work... what would happen if the GPS system whent out of commission for some reason?)
        • Or brute-force it, as noted by others in this thread. I'm no cryptographer but this sounds like crappity crappity crap to me.
      • Or they could just use an altered GPS receiver, so it caches your the location when they stand on your decryption tile for a minute, and then they can decrypt anywhere.

        And don't go and propose something like the Digital Millenium Positioning Act, which prohibits anyone from making a GPSR without paying $X to the RIAA/MPAA.
      • Someone stole your laptop? They're going to have to break into your house, steal a key to your room, and stand on your decryption square just to decrypt any of your files. Sounds like an interesting acrobatic scene for Mission Impossible 3.

        "While holding the holy laptop, standing on the sacred square, on third full moon of the year, make three clockwise circles with the mouse, then the sygil of Baalshamabeebop."

        ABORT, RESUMMON, INFERNAL DAMNATION?

  • this will provide a whole new aspect to geocaching! what will they think of next?
  • Good Lord (Score:4, Funny)

    by daeley ( 126313 ) on Tuesday April 02, 2002 @04:47AM (#3269403) Homepage
    Armed with Denning's geo-encryption system, which she co-patented in 1998, only people in specified locations, such as movie theaters, living rooms or corporate conference rooms, would be able to unscramble the data.

    This is going to make playing with the hanger-antenna on top of the TV look like nothing. "Honey, I can't watch the movie until you bring it in the living room." What's worse though...

    Medical records could be sent from a doctor in Peoria for a second opinion to a doctor in Manhattan--and all without the usual worries over privacy leaks to insurers or investigators along the way.

    "But doctor, I thought I *was* a Region 1 patient."
    • by Technician ( 215283 ) on Tuesday April 02, 2002 @09:59AM (#3269932)
      They still haven't fixed the problem of secure GPS to computer connection. Maybe a Cue Cat style serial numbered USB GPS will be required to make it work. Each subscriber would have a GPS with a unique serial number and an encrypted output much like that favorite free barcode wand. Without protecting the GPS/PC connection A pair of old 14.4K stand alone modems (one on a cell) will take a GPS signal from your favorite movie house and send it anywhere in the world in almost real time.

      Just dial it up. I could put a modem on a GPS at a subscribed location and let friends know where to dial in to connect. Internet latency would cover up transmission losses over the modem pair. Less than perfect timing would still work.
      • Actually I believe the NEMA 1.2 or whatever (the standard GPS data stream) is plain jane serial, so this would be fairly trivial.
        • The output from a standard GPS'es is plain ASCII. This is to be compatible with published NMEA standards. I copied the GPS output to disk once using a terminal program to fight a speeding ticket. I took records of several runs pacing traffic to court. I showed the runs on a map and marked the top bottom and average speed along several places including the ticket location. I took printouts of the raw data so if argued, it could be checked in court. That couldn't have been done with a propritory interface. The officers agreed with my results with no argurment. The did not dispute my findings. The judge was impressed with my work. I had traveled and was ticketed at slower than the average speed 4 weeks after the speed trap (photo radar) that slowed everyone down. I was able to prove the average speed of the slowest traffic after the slowdown (I passed nobody on these runs therby catching and pacing the slowest person) was more than my ticketed speed. In 4 runs I found someone under 55 in the 45 once 4 weeks after the speed trap. I let the Judge know ECM (radar detector) will be added to fight the highway robery, not to get away with speeding. The ticket was not for driving erraticaly or passing anyone. (Think slow driver in right lane getting the ticket for speeding. Photo radar does that. 56 in a 45 zone 500ft past the change from 55.) I got a ticket because my photo came out un-obscured. (thank God for open GPS interface standards!)
          There is one exception to open standard NMEA output GPS receivers I know about. The Delorme unit. (the cheap one without a display) It is propritory. Avoid it unless you only plan on using it with maps from Delorme. Their map software will accept NMEA, but their reciever will not output it. It's like a MS trick. You can use our hardware, but it works only with our software. Our software will work with your hardware. Sound familiar? That kept me from buying their hardware. I use my (NMEA standard) GPS with Wildflower (now National Geographic) maps and Chicago Maps software as well as a map selection from Delorme. I would have hated a single source closed propritory solution here. It simply would not have met my needs.
  • by Olivier Galibert ( 774 ) on Tuesday April 02, 2002 @04:47AM (#3269404)
    From a design point of view, it's simple. You have a gps, and some compuiter that will give you some data (i.e., a decription key) when the gps detects that you're at a specific position in space. The really, really hard part is making the device tamperproof.

    It has not only to resist to direct attacks trying to get to the data, it also has to deal with jamming of the gps signals, or more specifically putting the device in a faraday cage and sending it signals imitating the gps satellites in the appropriate position. Too bad the article has zero information on their methods.

    Oh well, let's hope a followup article by Schneier (who also considers the tamperproofing critical) will be more detailed on the technical side.

    OG.
    • by tftp ( 111690 ) on Tuesday April 02, 2002 @04:59AM (#3269433) Homepage
      It has not only to resist to direct attacks trying to get to the data, it also has to deal with jamming of the gps signals, or more specifically putting the device in a faraday cage and sending it signals imitating the gps satellites in the appropriate position. Too bad the article has zero information on their methods.

      Methods are irrelevant. As soon as you put the receiver into a Faraday cage, you are the master of the Universe (inside of the cage). You are free to simulate as many satellites, and in as many positions as you wish, and nothing inside the device can detect your simulations, except if the real signals have a digital signature.

      You don't even need to bother with a Faraday cage. Just use strong enough signals from your simulator, and they will jam the AGC inside the receiver, so that only your signals are received correctly.

      • Speaking of tampering, what is to prevent someone from using a pair of old 14.4 modems and pluging one in with the GPS at a location that has a subscription? Any machine anywhere can call the modem set to autoanswer which is connected to the GPS and get real valid data for the GPS location, not the PC location. I could be in Chicago where the big game is blacked out and call my dad retired in Florida and watch his feed using this simple cheat. I wonder if I should post annon. This may bend the DMCA discussing the merits and shortcommings of a security system. Since this isn't out in the wild as yet, I'll post this. They did already mention themselves that there was a problem with securing the PC to GPS connection so this is a known possible weak link.
      • You realize you could be violating the DMCA by saying that?

        Maybe we should add a new moderation:
        (+1, Illegal).

        ;)
        • You realize you could be violating the DMCA by saying that?

          Just imagine, a crowd of university graduates in EE cheerfully leaves the ceremony of graduation, and ... everyone gets arrested right there, on the spot, for posession of information that might be used for copyright infringement!

          Or another one, even better. A professor gets arrested in the middle of the class for teaching "too well". But I am afraid, that would not be new. A tyrant always kills educated people, lest they interfere with his plans.

    • by Nightlight3 ( 248096 ) on Tuesday April 02, 2002 @08:39AM (#3269748)
      You don't really need a Faraday cage. Namely to Change EM field vector A to a desired EM field vector B you simply add a single EM field vector C=B-A to A. The superposition will produce resulting vector B. A computer driven emitter with GPS sensors could probably do all this by inputing the desired coordinates into it.


      This is similar to computerized noise suppressors which work by continuously measuring the acoustic waves and emitting the waves of exactly the same amplitude and opposite phase. With GPS the situation is much easier since the waves to cancel are not random noise but a perfectly predictable source (after the initial measurement).

  • Holidays? (Score:4, Funny)

    by Mengoxon ( 303399 ) on Tuesday April 02, 2002 @04:48AM (#3269405)
    Great, that means I can't listen to my music, DVDs, use my software when I am on holidays, on a business trip or at my second home?
    • by autopr0n ( 534291 )
      It just means you have to buy a black-market fake-GPS signal generator
    • Great, that means I can't listen to my music, DVDs, use my software when I am on holidays, on a business trip or at my second home?
      Of course not. The music industry is loosing several billion dollars per year due to the the unauthorized use of purchased media in secondary locations. The second edition of the DCMA will provide legal measures against that.
  • by Any Web Loco ( 555458 ) on Tuesday April 02, 2002 @04:48AM (#3269406) Homepage
    they can come beat the information out of me?
  • No brainer (Score:1, Insightful)

    by Anonymous Coward
    So the encryption key is some location on Earth (longitude + latitude). Either you go there, or you use hack the device and input the coordinates without moving an inch.
  • by FredBaxter ( 158979 ) on Tuesday April 02, 2002 @04:50AM (#3269413) Homepage
    Perhaps I'm just really wrong (wouldn't be the first time) but do commercial GPS devices still have a small imperfection built in, along the scale of 10 meters (or was it more like 100)? I remember reading that the government did this to prevent terrorists from using GPS to pinpoint landmarks like the white house. This causes problems for some users though, such as being off by a city block or two, depending on the inaccuracy.

    --Please, don't waste your moderation points knocking me down. They can be used so much more effectivly elevating a worthy poster elsewhere...
    • It is significantly smaller than this. Also, i read recently that the military had stopped doing this, though this may not be true.

      Also, no matter the innacuracy, you can always get more accurate by sitting there for a bit longer.

      When i was cavortling around with one, you could get accuracies better than a metre.

    • by Anonymous Coward
      GPS Civilian Signal Degradation Turned Off [slashdot.org] May 1st 2000.
    • Re:Accuracy (Score:5, Informative)

      by silvaran ( 214334 ) on Tuesday April 02, 2002 @05:04AM (#3269446)
      It was around 100 meters in any direction from your current location. And yes, it was by the U.S. government to prevent people from bombing the White House. As if a bomb big enough, off by 100 meters, would actually miss the white house.

      They removed it sometime last year, I believe. With 9-11, there are rumors they may impose the restriction again, but that's assuming any primary threats have missiles capable of using GPS.

      This restriction would pose little or no problem to people using it for the purposes this article describes. GPS correction is available through a "post-processing" method. You position a GPS base station at a known location. If you take samples at exactly the same time from different locations, those locations are off by exactly the same error vector. So, you simply compare the base station samples to the base station position to get the error vector, and apply this error vector to the roaming samples to get your almost-exact position.

      I say almost exact because signals are disrupted by various things. Light and sound are waves; they move at a constant speed as long as the travel medium doesn't change. As a consequence, like sound, light is affected by the doppler effect. It usually isn't significant, but can throw your results off nonetheless.

      Clouds, rain, snow, buildings, etc. can also affect the results, as well as the SNR (signal to noise ratio -- measures the amount of readable data to background noise). If the SNR is high, it's unlikely the results will be thrown off significantly. All these problems are virtually unavoidable unless the weather is clear, you have a high channel capacity on your GPS device (8 is usually good, I think available satellites above the horizon range from about 8-11, high on elevated terrain), and there are few if any buildings around.

      You need at least n+1 satellites in reach to get nth-dimensional results. So, for planar (2d) positions (latitude/longitude, or azimuth or whatever) you need 3 satellites, and 4 for spatial (3d, 2d + a z-position, your elevation).

      The more satellites, the more precise your results are. If the base station is within 500 metres away, and you have real-time correction (which would still help with climate problems), you can get sub-centimetre accuracy.
      • Re:Accuracy (Score:3, Interesting)

        by tftp ( 111690 )
        With 9-11, there are rumors they may impose the restriction again, but that's assuming any primary threats have missiles capable of using GPS.

        Cruise missiles guide[d] themselves not with GPS, but just using a machine vision systems. They compare actual land beneath them to a map stored in the missile, and generate corrections this way. Does not work well at night, but totally self-contained and jam-proof.

        Besides, there are many other solutions to the "last 100 meters" problem. An infrared laser, for example, can highlight the target, and the missile locks onto the bright spot. This one is used for many years (so-called "laser-guided bombs").

        • Actually most cruise missiles use an inertial navigation system with terrain contour-matching updates and others use an inertial navigation system integrated with a multi-channel onboard GPS (AGM86B and AGM86C respectively). Furthermore, some guided bombs make use of an inertial/GPS system as well (GBU 31/32). So, while it certainly wouldn't cripple the military, a disruption of GPS would hamper them ever so slightly.
        • Cruise missiles guide[d] themselves not with GPS, but just using a machine vision systems. They compare actual land beneath them to a map stored in the missile, and generate corrections this way. Does not work well at night, but totally self-contained and jam-proof.

          I though they used radar rather than optical systems. The only missiles I recall using optical sensors are SLBMs.Anyway they also have an inertial navigation navigation system.

          Besides, there are many other solutions to the "last 100 meters" problem.

          Control by kamikazie being the most low tech option.
      • It was around 100 meters in any direction from your current location. And yes, it was by the U.S. government to prevent people from bombing the White House. As if a bomb big enough, off by 100 meters, would actually miss the white house

        Also based on the asumption that whoever is doing the bombing cannot see the target.

        They removed it sometime last year, I believe. With 9-11, there are rumors they may impose the restriction again, but that's assuming any primary threats have missiles capable of using GPS.

        Ignoring the fact that the terrorists that morning probably worked by eye.
    • Yes, there are three grades of accuracy.
      1. Civilian: this is what anyone can access. This was discontinued because companies were about to come out with units that compensated for the programmatic imperfections the satellites were feeding the receivers. It was accurate to within one hundred meters, and is still applied on a regional basis (for instance, Iraq still has Civilian-level GPS accuracy).
      2. Military: this is now what both civilians and the general military share. It is accurate to within approximately twenty meters.
      3. SpecOps: this is what the SEALs, DEVGRU and all their friends use. It is accurate to within approximately one meter.

      An interesting page on accuracy and, specifically, the impact of the removal of Selective Availability, the scrambling algorithm for the old "Civilian" accuracy level, is available here [erols.com], information on the SA shutdown's impact worldwide is here [noaa.gov], and, finally, the IGEB, in charge of all this, is here [igeb.gov].

      Jouster
    • ...using GPS to pinpoint landmarks like the white house.

      Isn't the whole point of a landmark that it doesn't move? I'm sure at some point SOMEONE was able to figure out a Good Enough targeting location for various key targets? What good would Selective Availability do against an inertial system fed these co-ords?

      GTRacer
      - IANAPG (precision gunner)

  • Come on people, enough is enough. AF was yesterday. Yesterday morning if you really want to stick to tradition. There's only so much you can take of these obviously stupid stories.
  • What a weird idea! (Score:5, Interesting)

    by tftp ( 111690 ) on Tuesday April 02, 2002 @04:53AM (#3269417) Homepage
    So this "cryptosystem" uses the GPS location as a key. Big deal. It's just Yet Another Key Generator. All it takes to defeat this scheme is a hack in the player, which asks "Enter GPS coordinates which came in this movie's NFO file", like serialz work. Alternatively, the unmodified player can be used, serially connected to another application that simulates the GPS receiver, asking the same question. Only if the decoder hardware is tamper-proof, then the known attacks against the key may be necessary.

    This is only how to defeat the system... I don't even mention what consumers will think of it... how would {RI,MP}AA justify licensing the material to a physical coordinates rather than a paying customer? It is not likely to work. GPS does not work inside buildings, BTW, and very few people go in a park to watch DVDs :-)

  • The article was short on details, but from what I gather, both the encryptor and decrypter are hardware units with built-in GPS systems.

    Last I checked, GPS coordinates were accurate to only tens of meters, though with inertial guidance the accuracy goes to 1 meter. So that is a limited number of possible locations, or keys. Next, as soon as the algorythm is made public knowledge, it would seem to be relatively simple to cycle through all possible GPS coordinates for a given class of potential receivers (geocaching all movie theaters in the US to gain potential keys for StarWars Episode III, for example..)

    I mean, isn't one of the hallmarks of a good encryption method the lack of availible clues as to what sorts of keys might have been used? It would seem this method is extremely weak. But hey, it's late, and the article was very thin. Anyone have anything better to add?

  • Well, one can pretty obviously do this: you get a tamperproof box, put in a GPS receiver and whatever else, and only when the GPS receiver believes it is receiving the right signals does it release the data. Of course, what this is supposed to achieve is another question. Without two-way communications, you can simply receive and rebroadcast the signals to the box wherever it is. If you are careful with the timing, the adversary can be anywhere in the world where he can see the right kinds of satellites and retransmit the signals with the right kind of timing. And if you manage to build a tamperproof box, there are a lot much more useful ways of locking up information than that.

    There are intersting things you can do with spatial location and cryptography, but this isn't it.

  • So at best you get to ensure the location of the recipient.

    And if the recipient records the video on their HDD and e-mails it to a friend?

    And their friend bungs it on a file sharing service?

    This may be good for preventing casual interception for location-to-location messaging when both parties want to keep things secret, but why is it any good if the recipient couldn't give a damn about secrecy?

    How is this going to help stick another finger in the rapidly spongifying dyke of copyright?
  • Old (Score:1, Troll)

    Uhh, guys I submitted this story last November and it was rejected. Now I'm not complaining about being rejected, but this story is really OLD, and the concept is a long way from being proven to be practical or even remotely possible.


    * 2001-11-22 21:35:54 New encryption technology : Geo-Encryption (articles,encryption) (rejected)

  • by NanoGator ( 522640 ) on Tuesday April 02, 2002 @04:59AM (#3269434) Homepage Journal
    Umm... the problem with this technology is that devising an interesting key isn't the problem. The problem is that people can crack the encryption scheme itself. Adding the GPS element to it makes it even easier.

    I mean seriously, it sounds like all you'd need to do is run a few integers through it and eventually it'd unlock. This would be far easier than trying to decipher a key. I doubt fooling the GPS would prove all that difficult.

    Maybe i'm oversimplifying the situation a bit, but it never really seemed to me like the key was the weakest link in modern encryption schemes. By localizing the key to GPS co-ordinates, you're making it far easier for somebody to know where to look.
    • by tftp ( 111690 ) on Tuesday April 02, 2002 @05:21AM (#3269474) Homepage
      Surface of Earth is 148,326,000 sq.km. [nationsonline.org], or 1.48326e+14 sq.meters. If the resolution of the GPS is 10x10 meters (100 sq. meters), the GPS can yield 1.48326e+12 keys, which is equivalent to a 40-bit key (2^40 = 1.1e+12). This is one easily breakable key. But if such a system is really used, the grid must be much rougher because of usability concerns (many households are longer/larger than 10 meters). Then the strength of the key drops significantly.

      Another important defect of this system is that in modern society most people live in cities, and as such the keys are not randomly distributed, but very much clustered. To find a movie key, for example, one just needs to try GPS locations of few big cities (SF, LA, NYC etc.) to hit the paydirt.

      But likely, this key search won't be needed at all, because whoever posts the material on Usenet will put the necessary serialz ^W GPS code into the accompanying note. The only problem is to apply the key to get the raw contents, and that is not too difficult because all the strength of the crypto is in the key, not in the algorithm.

  • GPS test equipment (Score:2, Insightful)

    by r_weaver ( 563014 )
    Seems like all it would take to break this encryption would be some GPS test equipment [edmo.com].

    Just hook the tester to the decryption unit, and voila, you can make the decryption unit think it's anywhere in the world.

    Is enough of the GPS protocol published to make it feasible to create GPS simulator equipment from scratch or is the signal encrypted in such a way to make it too difficult (i.e. if some foreign government can't legally buy a GPS simulator, how hard is it to make one?). Is it even possible for the commercial simulators to really emumlate the satellites, or can the GPS unit tell the difference between a test signal and a real satellite?

  • Did anybody else think that the use of the word 'copyright' in this article felt like it didn't belong? Either the author was running with an idea in his/her head that he didn't quite get to elaborating on, or he/she was hoping to ride the wave of publicity generated by SSSCA.

    "I got a scoop!"
  • This seems very Bond-ish. Less practical for protecting copyrights and more like it could be used to protect sensitive government data or something.

    "Remember 007, the document will be unreadable until you reach Paris..." ;)
  • There are two points here:

    - [If] it's keyed to GPS location,
    then you have a defined search space. This search space is the set of all practically resolvable locations on earth. Worse, this is (a bit) like a "non-flat" keyspace, since you can rule out *lots* of locations, and start with some obvious ones (think how John the Ripper and L0phtcrack work).

    - It requries a tamperproof unit.
    Go and look up all the usual issues with "tamperproof" units.

    Neither of these things make it useless. They just bound the situations (and probably the length of time) for which it may potentially be of use.
  • Dorothy E. Denning and Peter F. MacDoran wrote a article on the subject which was published in Computer Fraud & Security in February of 1996.

    To read the article click here [georgetown.edu].

    In addition, her home page is at http://www.cs.georgetown.edu/~denning/ [georgetown.edu].
  • by ddent ( 166525 ) on Tuesday April 02, 2002 @05:18AM (#3269465) Homepage
    This is probably to try and prevent intercepting a movie on its way to the theatres. As to whether it is possible to do this effectively is another question altogether...
  • by Llanfairpwllgwyngyll ( 81289 ) on Tuesday April 02, 2002 @05:59AM (#3269517) Journal
    So it's impossible to fake the GPS signals eh? They're not anything like a regular structured and well-understood format or anything....

    I suppose faraday cage technology will be outlawed (only terrorists would want to use a faraday cage surely...)

    Faking up the signals and the timing is a matter of some electronics. There is no strength here.

    Snake oil. Move on people, nothing to see here....
  • by Ryu2 ( 89645 ) on Tuesday April 02, 2002 @06:02AM (#3269525) Homepage Journal
    If you know the region which the data is intended for (eg, by looking at the region code on a DVD), voila, you just feed the data into whatever algorithm transforms GPS coordinates into the decryption key.

    Since GPS location is not random and is known, you can spoof the data, and not even have to do a brute force search over a random keyspace as you would with a normal cryptoscheme...
  • by villoks ( 27306 ) on Tuesday April 02, 2002 @06:08AM (#3269530) Homepage Journal
    Some juicy bites from her publications:

    Is Encryption Speech? A Cryptographer's Perspective [georgetown.edu]

    ..My conclusion is that modern encryption is predominately a privacy
    enhancing technology rather than speech. Although encryption might be
    regarded as a manner of speech, it is unlike other methods in that it
    contributes nothing to communication.

    One implication of this interpretation is that regulation of encryption
    would not violate the First Amendment. Another is that restrictions on
    the use of encryption could not be used as a basis for prohibiting the
    use of an obscure foreign language or any other ordinary language.


    Testimony Before U.S. House of Representatives, May 3, 1994. [georgetown.edu]


    "..The Clipper Chip and associated key escrow system is a technically
    sound approach for ensuring the security and privacy of electronic
    communications. Clipper's SKIPJACK encryption algorithm provides
    strong cryptographic security, and the key escrow system includes
    extensive safeguards to protect against unauthorized use of keys. The
    more advanced chip, Capstone, further provides all the cryptographic
    functionality needed for information security on the National
    Information Infrastructure."


    And there's even more, go and see by yourself. I'm really waiting for the comments from the cryptograhical community on this systems..

    V.

    • Since she had access to the details of Clipper and you didn't, and she knows way more about cryptography than you do...on what basis do you claim that her conclusions about Clipper are "stupid"?
      • on what basis do you claim that her conclusions about Clipper are "stupid"?

        Thinking that we'll trust the government not to misuse crypto keys is very, very stupid.
      • Her having access to the details of Clipper hardly makes her some unbiased expert on the technical merits of that chip. Do you recall when the FBI went shopping for universities that would sign of on Carnivore saying that it was great and that it wouldn't harm anyone's privacy? Some universities (MIT) refused to sell out and sign there name to the FBI's pre-written statement about what the "university review" had found, so the FBI had to go to universities with less scruples that would sign off on such things.

        The point is that the FBI lobbied Clipper in the same way. I'm sure they knew she would say this kind of stuff before they even approached her with any of the actual details.

        Also, for what it is worth, Clipper was completely bunk. Key escrow is a bogus concept anyway, but that aside, Clipper wasn't even a technically sound implementation of key escrow. They used a hash function so weak that you could erase your chips serial number, rewrite it as something random, and then collide their crappy hash to make it impossible to tell that you had tampered with the serial number. Voila, a Clipper for which they wouldn't know the key.

  • I can just see it -- "No dear, hold the book over to the left and bend slightly at the knee" just to read an eBook set for precise location decoding.

    I'll get to re-live my childhood wherein I had to stand off to the left of the TV and lean away while holding the antenna during Monday Night Football so my Dad could cheer the Cowboys. Uh...no thanks...

  • "came up with a way to make routers themselves "locationally intelligent"?in other words, the GPS-based encryption itself would change dynamically as it moved through the path from owner to user."

    Knowing how hard its been to get the router manufacturers to adopt IPv6, I think she's smoking "Happy Pixy Dust."

  • by astrashe ( 7452 ) on Tuesday April 02, 2002 @07:23AM (#3269630) Journal
    Prof. Denning used to be one of the chief supporters of the government's Clipper key escrow system:

    Click here [lycos.com] to read a letter she wrote at the time.
    • Though I'd think that this could be spoofed pretty easily, I would give her the benefit of the doubt.

      When she received evidence (not hearsay) that wiretap authority is being abused, she changed her mind quire publicly about Clipper and key escrow.

      Anyone staying true to the scientific method deserves a fair critique.

  • by mbone ( 558574 )
    There must be something they are not telling about, as this sounds really dumb to me.

    GPS is really simple in principle. There are 24 satellites in 12 hour orbits, with orbital planes arranged so that at least 4 are up for anyone on the planet at any time. Each satellite sends its own encrypted signal (actually, 2 such) to everyone who can receive it.

    The reciever decodes the signal, and checks the time lag between when each satellite's signal was received. That's it. All of the geolocation is deduced from the relative lags of the signals broadcast for all to receive.

    Four satellites are needed as the receiver's clock is probably off; two signals are sent as the easily decoded civilian one has errors put in to reduce accuracy (SA - Selective Availability), while the other signal has a military grade encryption.

    That's it. My signals differ from yours only based on the relative time delay between them.

    So, this is subject to a replay attack - simply record the signal at the desired location and replay it to a receiver at your actual location. This would work even for the military grade encryption, but would require a sensor at the actual target location of the geo-encryption.

    To do this near to (within 4000 km or so, so that the same satellites are up) of the target location, record the signal. Figure out the relative time delay's. Playback the signal multiple times with the appropriate lags for the other location. As the receiver uses a convolutional decoder and an omnidirectional antenna, if you do this right, the receiver will lock onto the time shifted satellite, and will come up with the wrong position.

    The above replay attack would require a wide bandwidth (few 100 mbps) record capability and (for the time shifted version) a good ephemeris - both easily available. AND, it would work even for encryptions using the military signal.

    But, you don't have to go to the trouble, as there is test equipment easily available that will do this for you (it's how you test receivers). This would not work for the encrypted military signal though.

    Since these people are not stupid, my guess is they will sell a decrypt chip with with a receiver on it, and maybe use tight time delay's windows to hinder replay attacks. Give me $ 30,000 for test / record equipment, and I will break it even so. Since this level is not out of bounds for industrial movie pirates, "This sounds dumb to me."
    • Way out of date...

      SA is turned off nowadays, differental GPS made it silly. The civilian signal is now identical in accuracy to the military signal.

      For the number of satellites, there are also 2 WAAS satellites. These are in geosync orbit above the pacific and atlantic coasts of North Americia, these receive corrections from 25 ground stations, and rebroadcast the corrections. Europe and Japan are also developing equvilant correction networks for their areas, so eventually there will be at least 29 satellites.

  • This has the same chance of success as using a NIC's MAC address for encryption.

    The idea of making the software and your NIC tamper proof, so that it always gets the "real" MAC address from the physical card is bypassed quite simply by writting new software that lets you plug in whatever MAC/GPS address you would care to pretend to have as a decryption input.

    Its a crack once, decode freely foreever problem, and its one of negligeable difficulty.
  • by hey! ( 33014 ) on Tuesday April 02, 2002 @09:19AM (#3269818) Homepage Journal
    The decryption key is in a hardware device (or in this case calculated from coordinates by the hardware device based on some other secret key). Presumably, the GPS receiver is integrated with the device so that positions can't be spoofed directly.

    This leaves two avenues of attack. The first is to recover the encryption key, the second is to spoof the satellite signals. Neither one is beyond someone with adequte resources (an intelligence agency or a serious industrial pirate). But supposing they are clever enough to avoid shipping a software based decoder, it will probably work well enough to discourage casual users.

  • 1 - As stated in the linked article, if the device isn't tamper-proof, it doesn't work.

    But also...

    2 - There's no reason you can't just convince the device it's at a different location by shielding out the real GPS signals and transmitting your own fake ones from nearby. I'm sure a good RF/GPS hacker could build a box to contain your geo-encryption device that allows you to select a fake longitude and latitude.

    The whole idea is just silly. There's no mathematical or scientific principle behind this geo-encryption that makes it work, just a supposedly tamper-proof box that relies on GPS airwaves to determine when it shoudl say "Yes, allow this data to be seen".
  • Patent (Score:2, Informative)

    by sn1987 ( 563121 )
    I havent had a chance to read it, but the patent for the method is 5,757,916

    (http://patft.uspto.gov/netahtml/srchnum.htm [uspto.gov] and enter the number)

    From the abstract: "A method and apparatus for authenticating the identity of a remote user entity where the identity of such user entity is authenticated by use of information specific to geodetic location of the user entity but that changes constantly, making "spoofing" the host device extremely difficult. The invention is preferably implemented utilizing satellite positioning technology to produce the identifying information."
  • Secure? (Score:2, Insightful)

    by buff_pilot ( 221119 )
    Jamming a GPS signal is not that hard - the amount of energy received by the antenna is minimal and can easily be jammed by a source on the ground. Anti-jamming GPS antennas detect jamming and "null" out the signal for that quadrant - just think of an antenna as a pie, all sliced up - if one segment is jammed, that slice of pie's information is discarded until the jamming goes away. The amount of satellites you recieve on your omni-directional GPS antenna will probably be lowered, but at least your signal won't disappear completely. (I don't have the links handy that explain this better)

    "Spoofing" the signal is much more difficult and is damn near impossible..(at least we think...) for a GPS that is getting signals from the satellite constellation. The only true way to spoof a GPS reciever would be to bring it into a closed room and set up a simulated constellation for the reciever to lock on to. Some universities have done this type of research in an effort to provide robots with a sense of location.

    The GPS string that is sent out by the reciever is defined by standards and is in plain text. The RMC, GGA, VTG sentences that are output are enough to give location, altitude, ground speed, etc. To simulate actual reception, all you have to do is playback a recorded text file of a previous reception. Heck, you wouldn't even need to use a recorded file - just make a script/program to spit the data out over the com/usb port. Hence, for this to be secure... The link from the GPS to the crypto black box had better be encrypted... But then how secure is that encryption? If this was a military only device where encryption is relied upon using their crypto devices and keytapes...then this thing could be robust. Once out into the civilian sector, they won't have the same level of encryption.

    What happens if I've got two conference rooms in the same building, both needing access, but both belonging to a different company? Will both companies look the same w/regards to GPS crypto?

    What's the "threshold" that the GPS system will accept as being "close enough"? Here's something to try...this assumes a GPS without the secret crypto keys loaded to get the "best" position. Start up a gps and keep logging the position that it thinks its at. This position will change ever so slightly over time. Reboot the GPS, compare the position on reboot...it will be a little bit different...(depending on how precise you want those co-ordinates)

    My point is that there will have to be some "slop" allowed...some noise level that will need to be allowed into the system.

    These are the things that could be used to exploit it.

    -jim
    • You mention a single source of jamming could be blocked out quite easily and that an isolated environment plus simulated constellation must be set up to trick a receiver. How does GPS test equipment work then? Are antennae set up around the receiver?

      This also raises the question of whether a GPS receiver has multiple antennas that are out of phase with each other. This is the only way I can see the receiver being dependent on and knowing satellite positions(angles mainly) relative it itself, independant of the data stream. I suppose accurate distance could be figured by timing differences between the signals.

      If this is the case, I could see the unit cancelling input at the antennas receiving the strongest signals from the flawed source, as you said a receiver is capable of.

      I had always figured each satellite identifies itself somewhere in the stream and that the receiver knows where satellite X is relative to Y, because they are in a regular orbit. That was a pretty uneducated guess. I still don't understand how GPS can pinpoint someone on land unless it is known exactly where at least one satellite is relative to the ground. Is that in the signal? Where can I do more reading?
  • This is so dumb. (Score:2, Informative)

    by A55M0NKEY ( 554964 )
    Rig a signal that LOOKS like the coordinates of the correct location and you'll fool the thing into thinking it's in the correct room. Really this is like having 3D cartesian coordinates as the decryption password. Big yawn.
  • I have just developed the best copyright protection scheme, and I hereby lay exclusive claim to it. My patent application is hitting the office today, so that no one can steal it.

    DNA-based decryption. This outdoes the GPS protection by leagues: you'll actually be able to use your copyright licensed material whereever you are in person, rather than being restricted to one location.

    Hah! I'm gonna be sooooo g.d. rich!
  • If you read her (not particularly technical) 1996 article [georgetown.edu], it seems that the real core of the security is precisely in the imprecision generated by the satellites:

    The location signature is virtually impossible to forge at the required
    accuracy. This is because the GPS observations at any given time are
    essentially unpredictable to high precision due to subtle satellite
    orbit perturbations, which are unknowable in real-time, and intentional
    signal instabilities (dithering) imposed by the U.S. Department of
    Defense selective availability (SA) security policy. Further, because a
    signature is invalid after five milliseconds, the attacker cannot spoof
    the location by replaying an intercepted signature, particularly when it
    is bound to the message (e.g., through a checksum or digital signature).
    Continuous authentication provides further protection against such
    attacks.


    In other words, they're using differential GPS to suck out the government-applied random numbers in the civilian signal and using that as the basis for crypto.

    In other other words, they're just piggybacking on whatever cryptosystem the government used for obfuscating GPS signals. One which applied when the article was written but no longer holds. So it's geographically limited, and has geolocation as a side effect, but it's not the core of the cryptosystem.
  • God the power... (Score:3, Informative)

    by KFury ( 19522 ) on Tuesday April 02, 2002 @12:59PM (#3270836) Homepage
    So once all media is constrained by GPS coordinates, the US gov't could selectively deny unfavored nations access to GPS data [wired.com], rendering all their DVDs, CDs and eBooks useless?

    Sound unlikely? It's interesting that the US is pressuring Europe to shelve its own GPS system [wired.com].

    Domination through media denial: "You want your mTV? Meet our demands."
  • prior art? (Score:2, Informative)

    by xener ( 71427 )
    This same idea is used in Greg Egan's SF novel
    'Distress', published in June 1997.

  • Yes, it's the same Dorothy Denning. She was the person who did the initial "Trial Balloon" push for key escrow, and when the NSA's Clipper Chip came out, she led the whitewash study team that published the initial "Yes, Skipjack appears strong" preliminary study and never did publish the "Is The Whole Clipper System Strong, Secure, Easy/Hard to Abuse" study that they were ostensibly tasked to do. It was an intellectually dishonest charade designed to provide PR for the FBI's system by saying "See, the Front Door is made of Very Strong Material, Pay No Attention To The Back Door Flapping Open In The Breeze with the big 'Cops Only' Neon Sign Or the Lack Of Hinge Pins on the Front Door."
  • What happens when the GPS unit doesn't get a lock on? Cell phones usually do not get a signal inside the big metal building where I work. I think it extremely unlikely that a GPS unit would be able to receive the five (?) different satellites needed for a lock. So does this scheme mean:

    1) That locations like this are permanently locked out? There are going to be some extremely unhappy customers...

    2) That if the GPS can't get a lock, it goes ahead and works anyhow? Aluminum foil will become a circumvention device... ;-)
  • Oh great! Now I can purchase software that only works in my mailbox. If I take it five hundred feet away to my residence it won't work because it's too far away.
  • We're not talking about a new form of DVD encryption, but a new form of authentication for real-time communications.

    This system as described in her paper uses two non-standard GPS receivers, one in the server and one in the client. These GPS receivers are used for client authentication by challenging the client to produce a signature that correctly locates the client to an authorized location and local time within a specified time frame.

    The signature is only valid for a 5ms period and corresponds to actual locations of GPS satellites as currently measured by the server.

    1) Server asks: at this GPS time marker, two seconds from now, tell me where you are.

    2) Client and server wait for the GPS clocks to get to the specified point.

    3) Client measures GPS satellite delays, calculates it's position at that moment, builds signature packet (think something like MD-5 digest for this step).

    4) Server measures GPS satellite delays at that same moment and waits for the Client response.

    5) Client transmits signature.

    6) Server receives signature, reads out the location as calculated by the client as well as the digest, applies it's own measurements to the calculated location and verifies the digest was based on actual GPS satellite locations.

    7) Server begins transmission of requested stream.

    This defeats the faraday cage model unless your system is monitoring the GPS constellation and precise enough to replicate their actual locations within the time frame required for signature production and transmission. This is possible, but the parameters are intentionally chosen to defeat this attack and it's likely they can be improved as the tech gets better. All that's needed is that the valid stays ahead of the hackers.

    There's simply no way to plug your GPS receiver simulator into the client and spoof it that way because the inputs needed by the client to produce its signature are the calculated GPS satellite delays, not the actual location provided by "normal" GPS with a NEMA serial interface. You're back to the faraday cage hack, which is probably very expensive.

    Since the goal of security is to make it more expensive to acquire the information than it is worth, the approach here seems sound.

    The encryption used to conceal the stream payload is the same highly effective encryption that everyone else is using and is vulnerable to the same attacks. Assume it's 4096-bit RSA covering 128-bit IDEA or better. The stream is "secure".

    IANASE (security expert), but I do develop network security products for a living...

    Regards, Ross

  • This one is going to be fun to crack! I love it when the ENTIRE WORLD can join together to solve a technical puzzle like this. Her scheme assumes that I am willing to buy this hardware and use the formats that she recommends. Well fuck her! I'm going to use different formats and different hardware. There has never yet been an "uncrackable" encryption scheme. At some point along the way -- it breaks down and fails. And as soon as we find that point you can kiss this mechanism goodbye! They make the shit... we crack it.
  • serious flaws (Score:3, Informative)

    by TheSHAD0W ( 258774 ) on Tuesday April 02, 2002 @04:19PM (#3272407) Homepage
    This idea has serious flaws which may undermine the security of the encryption.

    If an attacker has some idea of where the location is the GPS data will unlock, he can test the data agaist a range around that location. Given a GPS resolution of about 10 meters, there are 10,000 possible values per square kilometer. Testing a block of data against an area 10 kilometers on a side gives only a million possible permutations; child's play for modern computers. 100 kilometers on a side is 100 million permutations.
  • 10 paces toward the old oak tree, 40 paces due north.... and thar treasure be!
  • If this technology is successful, towns, counties, and other such municipalities could block playback of naughty material they deem "obscene".

    And then one day we'll read a newspaper article about some poor bastard getting arrested for transporting a DVD across state lines for purposes of indencency with himself.

  • by Jouster ( 144775 )
    This is the text of an email I received from Ms. Denning, which I have received permission to post here, verbatim:

    "Thanks for the link. Just to clarify a few points:

    The general concept was developed by Mark Seiler, Barry Glick, and Ron Karpf
    before I got involved. My role has been to devise ways of making it more
    secure. The methods are not derived from or related to the location-based
    authentication technology of CyberLocator, which was patented in 1998 (I am a
    co-inventor).

    GPS location is not used as the encryption key. Obviously this would not be
    secure. The techniques build on established methods of encryption and key
    exchange (symmetric or asymmetric) in a way that uses GPS to enhance security
    rather than diminish it.

    Devices do need to be tamperproof, and that is always an issue.

    I'm not sure where the stuff in the article about Internet routers came from.
    Geo-encryption can be done so that material must be delivered through particular
    distributors.

    The technology is not designed for protecting content intended to be used on
    mobile devices such as portable DVD players. One application for the technology
    is digital cinema delivered to movie theaters.

    I hope this clarifies some of the issues. I realize I have said little about
    how GPS is used, but we have not yet made that public.

    Dorothy Denning"

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...