跳到主要內容

臺灣博碩士論文加值系統

(44.197.230.180) 您好!臺灣時間:2022/08/20 11:10
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林宜燕
研究生(外文):I-Yen Lin
論文名稱:運用於DVD防拷機制之改良式金鑰管理與傳送系統
論文名稱(外文):An Enhanced Key Management and Transmission System for DVD Content Protection
指導教授:許文星
指導教授(外文):Wen-Hsing Hsu
學位類別:碩士
校院名稱:國立清華大學
系所名稱:電機工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:99
中文關鍵詞:碟片防拷加解密系統
外文關鍵詞:Content ProtectionCryptographic System
相關次數:
  • 被引用被引用:0
  • 點閱點閱:214
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著電腦科學和資料壓縮技術的日益進步,數位多媒體應用變得廣泛而普遍,更連帶帶動可攜式數位資料儲存技術的發展,CD和DVD即為此類之相關產品。然而,儲存資料於完全沒有防拷措施的光碟片中,相當於放任使用者隨意拷貝碟片內容,這對智慧財產權保護而言,不啻是一大傷害。
盜拷光碟資料的方法可說是繁不勝數,因此,一應因而生的防拷系統必然是個綜合性系統,而非單一架構可完成,並且,系統對於每一拷貝路徑都必須考慮周全,因為,對任一拷貝路徑的疏忽都會造成系統的瓦解。然而,在實際應用上,設計一完美的保護系統是不可行的,因為那必須付出太昂貴的成本,因此,防拷系統僅對最嚴重氾濫的盜拷途徑-利用燒錄機拷貝(數位對數位拷貝)來做加強。我們所提出之加解密架構和認證方法即是針對此目標而設計。
在本文中,我們提出一階層式金鑰管理和傳輸系統。我們的金鑰管理系統有兩大特點,一是區塊應用,另一是單向架構。藉由區塊應用,我們的系統可以達到一個重要的功能-許多不同的上層金鑰組都可藉由直接對應和非直接對應的MKB組來得到相同的解密金鑰,這對傳統系統而言是個很不可思議的功能,因其認為上層金鑰是唯一的一支,而非一組,更無法有多種不同選擇。單向的階層式架構,即是上層金鑰可藉由金鑰管理之演算法來求得下層金鑰值,下層金鑰卻沒有逆向匹配的演算法可回推出上層金鑰值,這種不可逆的架構可使得愈上層的金鑰安全性愈高。
我們的金鑰傳送系統也可視為金鑰管理系統的延伸,其系統必須配合金鑰管理系統,而無法獨立使用。其完成四大功能,其一是其可完整認證傳輸雙方的身份,其二是其可在一公開的環境下建立一僅雙方共享的祕密控制通道,其三是其利用金鑰管理系統,由傳輸端單向間接傳送祕密金鑰給接收端,其四是其傳送碟片內容的資訊通道是不需額外加解密的。
最後由系統的安全性分析顯示本文所提出之方法相較於現行之系統確實擁有較高的安全性。

Due to the rapid development of computer science, data compression, and optical storage technique, digital multimedia stored on CD or DVD has become more and more popular. However, an unrestricted user can arbitrarily copy the unprotected digital data on the media. That will cause great damage to intellectual property rights.
Because of various paths of copying data, a content protection system must be a comprehensive system in order to prevent all kinds of them. It is obvious that any weakness of this system may let it become feeble and die; in other words, the system should pay equal attention to every path of copy. However, in practice, to design a complete and perfect protection expends the large cost so that the system in chief focuses on avoiding byte-to-byte copy, which is so popular a duplication since the commercial CD burner is much widespread. That is the target what we try to achieve.
In this thesis, we propose a one-way hierarchical block-based key management and transmission system. By using block-based method, our proposed key management can achieve an important function that many sets of device keys can retrieve a shared media key, but there is only one device key used in traditional systems. The main idea of this achievement is via two blocks, a direct Media Keys Block (MKB) and an indirect MKB. By using this achievement, License Authority (LA) can distribute different set of keys to different compliant participant. The function of one-way hierarchical architecture is to generate a hindrance so that the higher layer of key management is invisible to the lower layers. In other words, the architecture is irreversible. It provides a good property — the higher layer the higher security. Our proposed key transmission method can be taken as an extension of our key management. It accomplished a complete authentication and a secret key exchange by using key management. Other advantages of our key transmission method are that the system does not need additional installations, and that the procedure of it does not need additional encryption process.

1 Introduction
1.1 Motivation
1.2 Active Content Protection Design
1.3 Objectives
1.4 Thesis Organization
2 Background
2.1 Introduction of DVD
2.2 Replication of Media
2.3 Cryptography
2.3.1 Advanced Encryption Standard - Rijndael
2.3.2 Digital Signature Standard - DSS
2.3.3 Diffie-Hellman Key Exchange
2.3.4 Security Attacks
3 Related Research
3.1 The Organizations for DVD Content Protection Techniques
3.2 Content Protection System Architecture
3.3 Media Authentication
3.3.1 SafeDisc
3.3.2 WobbleTrack
3.4 Watermarking
3.4.1 Watermarking in Transform Domain
3.4.2 SPOMF
3.5 Cryptographic System
3.5.1 Content Scramble System (CSS)
3.5.2 Content Protection for Prerecorded Media (CPPM)
3.6 Device and Bus Authentication
3.6.1 Intel’s Patent - Content Protection for Transmission Systems
3.6.2 Digital Transmission Content Protection (DTCP)
4 Proposed System
4.1 Key Management Method
4.1.1 Device Requirements
4.1.2 Simplified Key Management
4.1.3 Our Proposed Key Management
4.2 Key Transmission Method
4.2.1 Device Requirements
4.2.2 Handshake for Our Proposed Key Transmission
Method
4.3 The Characteristics of Our Approach
5 Experimental Results and Comparisons
5.1 Comparisons of Key Management
5.1.1 Parameter Setting for Key Management
5.1.2 Experiments
5.1.3 Comparisons of S-KM and HBKM
5.2 Comparisons of Handshake
6 Conclusions and Future Work

[1] Dana J. Parker, “Defining DVD,” IEEE Multimedia, vol. 6, no. 1, pp. 80-85, Jan.-March 1999.
[2] Jim Taylor, “DVD-Video: Multimedia for the Masses,” IEEE Multimedia, vol. 6, no. 3, pp. 86-92, July-Sept. 1999.
[3] M. Miller, I. J. Cox, and J. A. Bloom, “Watermarking in the Real World: An Application to DVD”, Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on, vol. 2, pp. 1496-1502, 1999
[4] J. A. Bloom, I. J. Cox, T. Kalker, J. P. Linnartz, M. Miller, and C. Traw, “Copy Protection for DVD Video,” Proc. IEEE, vol. 87, pp. 1267-1276, July 1999.
[5] D. Barr, “Copy Protection for High-Definition Baseband Video,” The International Conference on Information Technology: Coding and Computing (ITCC'00), Las Vegas, Nevada; 27-29 March 2000.
[6] H. Morito, M. Roe, and E. Lee, “Digital Copy Protection Scheme Using Recording Medium Identifier,” 1999 International Workshops on Parallel Processing, Wakamatsu, Japan; 21-24 Sept. 1999.
[7] B. H. Turnbull, “Important Legal Developments Regarding Protection of Copyrighted Content Against Unauthorized Copying,” IEEE Communications Magazine, vol. 39, pp. 92-100, Aug. 2001.
[8] Changsheng Xu, Yongwei Zhu, and D. D. Feng, “Content Protection and Usage Control for Digital Music,” Web Delivering of Music, 2001. Proceedings. First International Conference on, pp. 51-58, 2001
[9] L. Gang, A. N. Akansu, M. Ramkumar, and Xuefei Xie, “On-line music protection and MP3 compression,” Intelligent Multimedia, Video and Speech Processing, 2001. Proceedings of 2001 International Symposium on, pp. 13-16, 2001.
[10] Frederic Andres, “Media and Security,” IEEE Multimedia, vol. 8, no. 4, pp. 20-21, Oct.-Dec. 2001.
[11] Hong Heather Yu, Deepa Kundur, and Ching-Yung Lin, “Spies, Thieves, and Lies: The Battle for Multimedia in the Digital Era,” IEEE Multimedia, vol. 8, no. 3, pp. 8-12, July-Sept. 2001.
[12] Forouzan Golshani, “Digital-Watermarking Faces Challenges,” IEEE Multimedia, vol. 5, no. 3, pp. 6-7, July-Sept. 1998.
[13] Rajiv Mehrotra, “Digital Copyright Battles Continue,” IEEE Multimedia, vol.7, no. 1, pp. 7-8, Jan.-March 2000.
[14] Heather Yu, Xiangyang Kong, and Wayne Wolf, “Techniques for Content-Based Graph Authentication,” IEEE Multimedia, vol. 8, no. 4, pp. 38-45, Oct.-Dec. 2001.
[15] Jana Dittmann, Petra Wohlmacher, and Klara Nahrstedt, “Using Cryptographic and Watermarking Algorithms,” IEEE Multimedia, vol. 8, no. 4, pp. 54-65, Oct.-Dec. 2001.
[16] Chatschik C. Bisdikian, and Baiju V. Patel, “Cost-Based Program Allocation for Distributed Multimedia-on-Demand Systems,” IEEE Multimedia, vol. 3, no. 3, July-Sept. 1996.
[17] I. J. Cox, J. Kiliant, T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1678, Dec. 1997.
[18] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, Sept. 2000.
[19] N. Memon, and P. W. Wong, “Protecting Digital Media Content,” Communications of the ACM, vol. 41, no. 7, pp. 35-43, July 1998.
[20] C. T. Hsu, and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, Jan. 1999.
[21] C. T. Hsu, and J. L. Wu, “DCT-Based Watermarking for Video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[22] W. Diffie, and M. Hellman “New Directions in Cryptography,” IEEE Transactions on Information Theory, Nov. 1976.
[23] W. Diffie, and M. Hellman, “Exhaustive Crytanalysis of the NBS Data Encryption Standard,” Computer, June 1977.
[24] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, July 1985.
[25] C. Schnorr, “Efficient Signatures for Smart Card,” Journal of Cryptology, no. 3, 1991.
[26] Joan Daemen, and Vincent Rijmen, “AES Proposal: Rijndael,” Sept. 1999.
[27] E. Bihan, “New Types of Cryptanalysis Attacks Using Related Keys,” Advances in Cryptology, Proceedings Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1993, pp. 398-409.
[28] Chris Russell, Todd Avery Outten, Bryan Gentry Spaulding, Scott Jeffrey Sherr, Ira Steven Rubenstein, Yair Landau, Brian David Lakamp, Jeremy E. Barnett, Douglas Daiseug Chey, Michael R. Arrieta, Mary Korman, Harish Mandyam;, Thomas M. Rodriguez, Andrew Mosson, Ernesto Brodersohn, and Mary Abraham, “Secure digital content licensing system and method,” United State Patent Application 20020049679, 25 April 2002.
[29] Tomoyuki Asano, and Yoshitomo Osawa, “Information Recording Device, Information Playback Device, Information Recording Method, Information Playback Method, and Information Recording Medium and Program Providing Medium Used Therewith,” United State Patent Application 20020044657, 18 April 2002.
[30] David Rogoff, and Steven Petilli, “Cryptographic Key Distribution System and Method for Digital Video Systems,” United State Application 20020037081, 28 March 2002.
[31] Chandler Brendan Stanton Traw, and David Wayne Aucsmith, “Content Protection for Transmission Systems,” United State Application 20020007452, 17 Jan. 2002.
[32] Erlend Olson, David Rogoff, Steven Petilli, and Oleh Zajac, “Cryptographic Key Distribution System and Method for Digital Video Systems,” United State Application 20020003878, 10 Jan. 2002.
[33] Yasuhiro Ishibashi, “Content Processing System and Content Protecting Method,” United State Application 20010021255, 13 Sept. 2001.
[34] Chandler Brendan Stanton Traw, and David Wayne Aucsmith, “Content Protection for Transmission Systems,” United State Patent 5949877, 7 Sept. 1999.
[35] Ryo Nakayama, and Isamu Iwamoto, “Content Protection Method and Content Protection System,” United State Patent 6209097, 27 March 2001.
[36] 4C Entity, LLC, “Content Protection System Architecture: A Comprehensive Framework for Content Protection, Version 0.81.”
[37] 4C Entity, LLC, “CPPM Specification: Introduction and Common Cryptographic Elements, Revision 0.93.”
[38] 4C Entity, LLC, “CPRM Specification: Introduction and Common Cryptographic Elements, Revision 0.94.”
[39] 4C Entity, LLC, “C2 Block Cipher Specification, Revision 0.9.”
[40] 4C Entity, LLC, “CSS Compatible DVD Drive Authentication for CPPM, Revision 0.91.”
[41] Frank A. Stevenson, “Cryptanalysis of Content Scramble System,” 8 Nov. 1999.
[42] DVD Forum, “DVD Specifications for Read-Only Disc.”
[43] Heitaro Nakajima, and Hiroshi Ogawa, “Compact Disc Technology,” Tokyo, Japan; Ohmsha, 1992.
[44] Jim Taylor, “DVD Demystified,” Second Edition, New York, McGRAW-HILL, 2001.
[45] Edited by Meta Nissley, and Nancy Melin Nelson, “CD-ROM Licensing and Copyright Issues for Libraries,” Westport, Meckler, 1990.
[46] G. Simmons ed. “Contemporary Cryptology: The Science of Information Integrity,” Piscataway, IEEE Press, 1992.
[47] C. Huitema, “IPv6: The New Internet Protocol,” Upper Saddle River, Prentice Hall, 1998.
[48] William Stallings, “Cryptography and Network Security — Principles and Practice,” Second Edition, Upper Saddler River, NJ; Prentice Hall, 1999.
[49] http://www.dvdforum.org/
[50] http://www.dvdfllc.co.jp/
[51] http://www.philips.com/
[52] http://www.mpegla.com/
[53] http://www.4centity.com/
[54] http://www.c-dilla.com/
[55] http://www.macrovision.com/index.html
[56] http://www.sony.com/
[57] http://www.laserlock.com/
[58] http://www.linkdata.com/newhome/index.htm
[59] http://www.spinner.nl/default.html
[60] http://www.ttrtech.com/
[61] http://www.toolex.com/flash/index.html
[62] http://www.dinamic.com/
[63] http://www.kochdigi.com/
[64] http://www.vob.de/
[65] http://www.disctronics.co.uk/
[66] http://www.digimarc.com/
[67] http://www.dtcp.com/
[68] http://www.dvdcca.org/

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top