nuovo drm paradiso
play

Nuovo DRM Paradiso Towards a verified, fair DRM protocol Hugo - PowerPoint PPT Presentation

Nuovo DRM Paradiso Towards a verified, fair DRM protocol Hugo Jonker h.l.jonker@tue.nl Srijith Krishnan Nair srijith@few.vu.nl Mohammad Torabi Dashti dashti@cwi.nl Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising


  1. Nuovo DRM Paradiso Towards a verified, fair DRM protocol Hugo Jonker h.l.jonker@tue.nl Srijith Krishnan Nair srijith@few.vu.nl Mohammad Torabi Dashti dashti@cwi.nl Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 1/12

  2. Digital Rights Management ■ Goal: Introduction ◆ restrict access to digital contents ● Digital Rights Management ◆ access granted only when complying with license NPGCT Scheme Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 2/12

  3. Digital Rights Management ■ Goal: Introduction ◆ restrict access to digital contents ● Digital Rights Management ◆ access granted only when complying with license NPGCT Scheme ■ Method: Nuovo DRM Assessment enforce link by bundling license with content Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 2/12

  4. Digital Rights Management ■ Goal: Introduction ◆ restrict access to digital contents ● Digital Rights Management ◆ access granted only when complying with license NPGCT Scheme ■ Method: Nuovo DRM Assessment enforce link by bundling license with content Conclusions ■ Environment: ◆ trusted devices (well...) ◆ trusted content providers Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 2/12

  5. Digital Rights Management ■ Goal: Introduction ◆ restrict access to digital contents ● Digital Rights Management ◆ access granted only when complying with license NPGCT Scheme ■ Method: Nuovo DRM Assessment enforce link by bundling license with content Conclusions ■ Environment: ◆ trusted devices (well...) ◆ trusted content providers ■ Enemy: ◆ untrusted device owners ◆ Untrusted network Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 2/12

  6. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction NPGCT Scheme ● Enabling C2C exchange ● Protocols ● Weaknesses Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  7. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction ■ solution: enable client-to-client exchanges... NPGCT Scheme ● Enabling C2C exchange ● Protocols ● Weaknesses Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  8. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction ■ solution: enable client-to-client exchanges... NPGCT Scheme ● Enabling C2C exchange ■ ... whilst preserving DRM ● Protocols ● Weaknesses Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  9. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction ■ solution: enable client-to-client exchanges... NPGCT Scheme ● Enabling C2C exchange ■ ... whilst preserving DRM ● Protocols ● Weaknesses Nuovo DRM Adapt intruder model: Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  10. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction ■ solution: enable client-to-client exchanges... NPGCT Scheme ● Enabling C2C exchange ■ ... whilst preserving DRM ● Protocols ● Weaknesses Nuovo DRM Adapt intruder model: Assessment ■ complete, lasting protection unrealistic... Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  11. Enabling C2C exchange ■ bottleneck in provider-to-client exchanges: bandwidth Introduction ■ solution: enable client-to-client exchanges... NPGCT Scheme ● Enabling C2C exchange ■ ... whilst preserving DRM ● Protocols ● Weaknesses Nuovo DRM Adapt intruder model: Assessment ■ complete, lasting protection unrealistic... Conclusions ■ thus: migitation procedures: ◆ detection ◆ revocation list Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 3/12

  12. Protocols Provider-client: Introduction NPGCT Scheme 1 . C → P : Request content ● Enabling C2C exchange ● Protocols 2 . C ↔ P : Mutual authentication, [payment] ● Weaknesses Nuovo DRM 3 . P → C : { M } K , { K } pk ( C ) , R, metadata ( M ) , Λ Assessment Conclusions Client-client: 1 . D → C : Request content 2 . C ↔ D : Mutual authentication { M } K ′ , { K ′ } pk ( D ) , R C ( M ) , R ′ , metadata ( M ) , Λ , Λ ′ 3 . C → D : 4 . D : Verification 5 . D → C : ψ, [ payment ] Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 4/12

  13. Weaknesses 1. P2C: no link request — rights Introduction attack: insert rights NPGCT Scheme ● Enabling C2C exchange ● Protocols ● Weaknesses Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 5/12

  14. Weaknesses 1. P2C: no link request — rights Introduction attack: insert rights NPGCT Scheme ● Enabling C2C exchange ● Protocols 2. C2C: No link delivery — payment ● Weaknesses attack: abort before payment Nuovo DRM Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 5/12

  15. Weaknesses 1. P2C: no link request — rights Introduction attack: insert rights NPGCT Scheme ● Enabling C2C exchange ● Protocols 2. C2C: No link delivery — payment ● Weaknesses attack: abort before payment Nuovo DRM Assessment Fairness (violated in C2C): Conclusions “Either both parties terminate successfully, or none does” Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 5/12

  16. Weaknesses 1. P2C: no link request — rights Introduction attack: insert rights NPGCT Scheme ● Enabling C2C exchange ● Protocols 2. C2C: No link delivery — payment ● Weaknesses attack: abort before payment Nuovo DRM Assessment Fairness (violated in C2C): Conclusions “Either both parties terminate successfully, or none does” ■ Not possible without TTP ■ Optimistic fair exchange: only use TTP if fairness violated otherwise ■ Two protocols: optimistic exchange and recovery Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 5/12

  17. Design Motivation: Introduction NPGCT Scheme Nuovo DRM ● Design ● P2C protocol ● C2C protocols Goals of Nuovo: Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 6/12

  18. Design Motivation: Introduction NPGCT Scheme ■ address weaknesses Nuovo DRM ■ increase assurance of security ● Design ● P2C protocol ● C2C protocols Goals of Nuovo: Assessment Conclusions Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 6/12

  19. Design Motivation: Introduction NPGCT Scheme ■ address weaknesses Nuovo DRM ■ increase assurance of security ● Design ● P2C protocol ● C2C protocols Goals of Nuovo: Assessment Conclusions ■ effectiveness ■ secrecy ■ resist content masquerading ■ fairness Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 6/12

  20. P2C protocol Provider — client exchange: Introduction NPGCT Scheme 1 . owner ( C ) → C : P, h ( M ) , R Nuovo DRM ● Design 2 . C → P : C, n C ● P2C protocol ● C2C protocols 3 . P → C : { n P , n C , C } sk ( P ) Assessment 4 . C → P : { n C , n P , h ( M ) , R, P } sk ( C ) Conclusions 5 . P → C : { M } K , { K } pk ( C ) , { R, n C } SK ( P ) ■ concrete protocol ■ first weakness addressed (validity of R ) Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 7/12

  21. C2C protocols Client — client optimistic exchange: Introduction NPGCT Scheme C, h ( M ) , R ′ 1 . owner ( D ) → D : Nuovo DRM ● Design 2 . D → C : D, n D ● P2C protocol ● C2C protocols 3 . C → D : { n C , n D , D } sk ( C ) Assessment { n D , n C , h ( M ) , R ′ , C } sk ( D ) 4 . D → C : Conclusions { M } K , { K } pk ( D ) , { R ′ , n D } sk ( C ) 5 . C → D : Client — client, recovery: 5 r . D : resolves ( D ) 6 r . D, n ′ D → P : D 7 r . { n P , n ′ P → D : D , D } sk ( P ) 8 r . { n ′ D , n P , � n D , n C , h ( M ) , R ′ , C � , P } sk ( D ) D → P : 9 r . { M } K , { K } pk ( D ) , { R ′ , n ′ P → D : D } SK ( P ) Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 8/12

  22. Formal analysis Modelling in µ CRL: Introduction NPGCT Scheme ■ Nuovo DRM Nuovo DRM ■ communication model Assessment ● Formal analysis ■ intruder model – Dolev-Yao, with restrictions ● Analysis results ● Device revocation Conclusions Analysed scenario’s: 1. no intruder, synchronous communication (effectiveness) 2. intruder, asynchronous communication (secrecy, masquerading, fairness) Hugo Jonker, WISSEC2006, November 8, 2006, Antwerpen Formalising Receipt-freeness - p. 9/12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend