2.7 DRM Under Attack: Weaknesses in Existing Systems

نویسندگان

  • Tobias Hauser
  • Christian Wenz
چکیده

The interesting fight between crackers518 and DRM systems is not a match just for the sake of entertainment. It also has consequences in the real world. The cracker itself is not the most terrible danger. He is only one person who uses the forbidden digital right for own purposes. It gets more dangerous when he shares his knowledge on cracking with others. Everybody has access to all kinds of information via the Internet. Although crackers have to have certain knowledge and skills they can distribute their cracking knowledge in “easy to use” software tools via the Internet so that everybody can easily download these “packages” without having any cracking skills of their own. Now this is where the real problem starts. This chapter focuses on the available cracking tools suitable for the most common formats and DRM systems like Windows Media Player and PDF, which represent the virtual goods sound, video and eBooks. The chapter also shows methods for sound and video grabbing, an alternative for the direct attack to DRM systems. The technical background of cracking tools can help to create better DRM systems and to inform users about the danger. Only when you have the knowledge you can react. The intention of giving technical background information should not be misinterpreted as a guide for crackers. It much rather intends to reveal the weaknesses of some systems in order to understand them better.519

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building secure software-based DRM systems

Software-based DRM systems promise fast access to a large market. But for a long time it has been assumed that software-based DRM systems are inherently insecure and should not be used for high quality content. We present a way to build secure software-based DRM systems. After analysing the weaknesses of current DRM systems we devise a strategy for the construction of software-based DRM systems...

متن کامل

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

Verification and Application of Conceptual Model and Security Requirements on Practical Drm Systems in E-learning

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The expl...

متن کامل

Towards Meeting the Privacy Challenge: Adapting DRM

Achieving the privacy needs for applications as expressed in law is complex. Currently there is no commonly accepted technical approach for meeting these privacy requirements. An often-fruitful way for uncovering solutions to challenges such as this is to examine how technologies used in quite different applications may be adapted for the purpose. In this paper, we examine the prospect of adapt...

متن کامل

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses

The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py6 were discovered. One main contribution of the paper is the detection of related-key weaknesses in the Py-family of ciphers including the strongest member TPypy. Under related keys, we show a distinguishing attack on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003