You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/221135076

Broadcast encryption versus public-key cryptography in content protection


systems

Conference Paper · November 2009


DOI: 10.1145/1655048.1655055 · Source: DBLP

CITATIONS READS
4 354

1 author:

Jeffrey Lotspiech
Lotspiech.com, LLC
69 PUBLICATIONS 2,153 CITATIONS

SEE PROFILE

All content following this page was uploaded by Jeffrey Lotspiech on 04 June 2015.

The user has requested enhancement of the downloaded file.


Broadcast Encryption versus Public-Key Cryptography
in Content Protection Systems

Jeffrey B. Lotspiech
Lotspiech.com, LLC
2858 Hartwick Pines Drive
Henderson, Nevada
011-702-263-2450
jeff@lotspiech.com

ABSTRACT public-key signature. There was no broadcast-encryption-based


authentication protocol. And, while there were forensic tests to
Broadcast encryption and public-key cryptography are two discover the broadcast-encryption keys an attacker had
competing key management schemes. Both are in use today, compromised during an attack, the number of tests was cubic in
although public key is much more pervasive (pervasive in the the number of identities the attacker had subsumed. Since then, all
number of systems, not necessarily in the number of devices). In these limitations have been overcome: there is “signature-like
certain applications, especially the content protection or “Digital primitive” that works with broadcast encryption keys; there is an
Rights Management” application, broadcast encryption seems to authentication protocol; and the number of forensic tests
offer real advantages. In the last two or three years, advances necessary to discover the attackers’ keys is now linear in the
have been made which offer new functionality to broadcast- attackers’ identities. The purpose of this paper is to update the
encryption systems: a “signature-like” function, a device original magazine article and describe these new advances. Along
authentication protocol, “unified media key blocks” enhancing the way, it will also contrast the broadcast-encryption approach
forensics, and “security classes”. These new advances are versus the public-key approach. Not surprisingly, it will conclude
summarized in this paper. The device authentication protocol has that broadcast encryption’s future is still bright.
not previously been described in the academic literature, although
it has been proposed in commercial systems. The term “broadcast encryption” gets its name from the title
of a paper Amos Fiat and Moni Naor wrote in 1993[2]. In this
The author believes the reason that broadcast encryption has not
paper they asked the question: can two parties, who have not
been used more frequently in content protection is more due to
communicated before, agree upon a key without having a two-
system designers being unfamiliar with it, and less due to any
way conversation? The answer was “yes”, and they used the word
advantages of public-key cryptography. The author hopes that this
“broadcast” to capture the one-way nature of the protocol. It did
paper might begin to reverse this trend.
not necessarily imply a one-to-many transmission. In fact, to my
Categories and Subject Descriptors knowledge, broadcast encryption has never been used to actually
J.5 [Computer Applications, Arts and Humanities] protect commercial broadcasts. Broadcast encryption has been
used widely, however, to protect commercial entertainment
content on physical media like DVDs. The reason is obvious;
General Terms public key cryptography simply does not work—assuming the
Security application cannot demand Internet connectivity for all the
players. Replicators produce encrypted discs and players play
Keywords them without any opportunity to have a handshake with the
Broadcast encryption, tracing traitors, content protection, DRM. replicator; this is a classic one-way flow that broadcast encryption
was designed to handle. Although the original DVD protection
1. INTRODUCTION scheme, the Content Scrambling System (CSS), was invented
Seven years ago, Stefan Nusser, Florian Pestoni, and I wrote prior to the invention of broadcast encryption, subsequent
a magazine article entitled “Broadcast Encryption’s Bright schemes, such as the ones used on DVD recordable discs and the
Future”[1]. Back then, there was no way to use broadcast new Blu-ray high-definition optical discs, use it. It is also used in
encryption key management to do something analogous to a every Secure Digital (SD) flash memory card, so literally billions
of devices have been manufactured with built-in broadcast
encryption key management. The major commercial systems are
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are Content Protection for Recordable Media (CPRM)[4], which
not made or distributed for profit or commercial advantage and that protects DVD recordable discs and SD cards, and Advanced
copies bear this notice and the full citation on the first page. To copy Access Content System (AACS)[3], which protects Blu-ray and
otherwise, or republish, to post on servers or to redistribute to lists, HD-DVD discs.
requires prior specific permission and/or a fee.
DRM’09, November 9, 2009, Chicago, Illinois, USA.
Copyright 2009 ACM 978-1-60558-779-0/09/11...$10.00.

39
How does broadcast encryption work? There are many broadcast encryption scheme. Certainly, all practical broadcast
schemes, but they each begin by some agency subdividing the encryption schemes have found ingenious ways to trade-off the
participating devices into subsets. Each device is in many subsets. number of keys the devices knows (the number of subsets it is in)
Each subset is associated with a cryptographic key. A device with the size of the MKB required for a given set of revoked
knows the key for every subset it belongs to. Then the agency devices.
generates random media keys and produces media key blocks
(MKBs)1. An MKB is simply a selection of subsets of devices With this background, you can imagine how a recorder can
such that the subsets cover all of the non-compromised devices in make a recording, and a player can play it back, without having to
the system, and none of the subsets contains single compromised have a two-way handshake to agree upon a key: the recorder
device. Figure 1 below illustrates how an agency might select stores a MKB on the media3 and then encrypts the content with
subsets of a universe of devices to exclude the compromised either the media key itself, or with a another random key
devices (the X’s in this figure). encrypted by the media key. For playback, the player merely
processes the MKB to get the necessary key to decrypt the
content. The recorder has confidence that no compromised player
will be able to play the content, because it will be unable process
X
the MKB. Of course, if a player is compromised after the
X recording was made, then that compromised player will be able to
play the recording—or, more likely, decrypt it so it can be
distributed in the clear. This is an unavoidable fact of life when
X protecting content on physical media, but there are techniques that
subsets can mitigate it in many cases. We will return to this topic in
compromised section 3.
devices
DEVICES In the first non-trivial broadcast encryption schemes, a given
device was in dozens of subsets, and therefore stored dozens of
keys. MKBs were also relatively large, for example the MKB for
Figure 1. A Broadcast Encryption Scheme Excluding DVD Audio is 3 MB. Then, in 2001, the subset-difference
Compromised Devices broadcast encryption scheme was invented[5]. In this scheme, a
device is literally in billions of subsets, but thankfully does not
In addition, the MKB contains a list of encryptions of a have to store the keys for all of them. Instead, the subsets are
media key with each of the selected subset keys. Given an MKB, organized in a tree structure so that any two subsets are either
a device searches it until it finds a subset it belongs to. Then it completely disjoint, or one is a subset of the other. A subset key is
knows both how to index into the list of media key encryptions always a one-way function of the key used in the next higher
and which subset key to use to decrypt this entry. Any two subset, greatly reducing the number of subset keys a device has to
uncompromised devices will calculate the same media key, store. With so many subsets to choose from, the agency can
although, unless they are in the same subset, they will not produce MKBs whose size is linear in the number of devices
calculate it in the same way. Figure 2 below illustrates an being revoked. This is the best one can do, and is exactly
example media key block identifying subsets i, j, and k, and after comparable to a public-key certificate revocation list in this
each subset identifier, the encryption of the media key Km in the respect.
2
particular subset key , for example, Ki.
It is no accident that the examples we have chosen so far are
from content protection (or, if you like, “digital rights
management”) applications. The content protection application is
i e(Ki, Km) j e(Kj, Km) k e(Kk, Km) … an excellent match for broadcast encryption4. As previously
mentioned, it is essential for physical media, but it is useful even
Figure 2. An Example Media Key Block Syntax in situations where two-way conversations between devices are
possible. Often, in a public-key content protection system,
devices exchange their public-key credentials not to actually
There is a trivial broadcast encryption scheme where every
identify themselves, but instead to prove to each other that neither
device is alone in a single-device subset. That means every device
is on the revocation list. They want to know that the device they
only needs to store a single key, but the size of the MKB is huge;
are connecting to is compliant; it is not a circumvention device. In
it is proportional to the number of unrevoked devices in the
system. Some would not even call this degenerate case a
3
Alternatively, the blank media can be manufactured with MKBs
already recorded on them. For example, SD card manufacturers
1
The original Fiat and Naor paper called them “session keys” and place 16 MKBs on each card at manufacturing time. These
“session key blocks”. different MKBs are used for different content protection
2
Actually, the media key is exclusive-or’ed with the subset applications, like video, audio, publishing, etc.
4
identifier before being encrypted, to avoid encrypting multiple In our original magazine article, I wanted to call content
keys with a single value and thus allowing an attack called the protection the “poster child” application, but my co-authors
Birthday Paradox Attack. talked me out of it. I guess they are not here for this one.

40
both public-key systems and broadcast-encryption systems, there moves” that is sufficient. The recorder is compliant (or else it
is an implicit assumption that circumvention devices will be could not have calculated the key), and compliant devices play by
revoked. However, revocation in a broadcast-encryption system is the rules.
inherent in its MKBs and therefore automatically tied to the
content being protected. A public-key revocation list is not However, there are situations where you do not want to trust
automatically tied to anything; special measures have to be taken “any device in the system”. A classic case is the version number
in a public-key content protection system to make sure that new in the MKB. Devices that store MKBs refer to the version number
content is tied to the latest revocation list. So, what happens to make sure they always have the latest one they have seen. If
indirectly and occasionally even incorrectly in a public-key any device could attest for the version number, than the first
system, happens directly and inevitably correctly in a broadcast- compromised device might be able to flood the system with
encryption system. down-level, but purportedly recent, MKBs and avoid getting
revoked. In AACS, the licensing agency signs each MKB using
an elliptic curve digital signature algorithm. Thus, AACS is
It is not just that broadcast encryption is more
actually a hybrid system, using broadcast encryption for the
straightforward in applications where compliance is the issue;
fundamental protection on the content, but using public-key
there is an even more compelling advantage: the calculations
calculations for MKB versions, for content certificates, for
involved in broadcast encryption can be done completely with
download servers, and for device authentication (see section 3).
symmetric encryptions and decryptions. This means that the
calculation overhead can be literally 1000x less, compared to the
The mechanism to achieve a signature-like attestation with
elliptic curve versions of public-key cryptography that the
broadcast encryption[9] is actually quite simple, especially if it is
consumer electronics companies favor.
the licensing agency (the agency that produces MKBs) which is
attesting to a message. The licensing agency simply exclusive-ors
To be honest, there is nothing about broadcast that inherently
a hash of the message with each subset key before encrypting
demands that it use symmetric key cryptography. Each subset
with the media key in each MKB they produce. If the message has
could be associated with a public/private key pair; the devices
been tampered with, each subset will calculate the wrong key, and
knowing the private key for each subset they belong to. In such a
system, anyone can generate an MKB because the public keys of this wrong key will be different from subset to subset5. So, if the
the subsets can be published. Even the subset-difference scheme, message is the version number in the MKB, and the attackers
which requires these private keys are related by one-way change the version number, the MKB is corrupt and unusable.
functions, has a public-key version[13]. Nonetheless, these
approaches have languished, unable to find a compelling Of course, the attackers might have compromised some
application. Content protection is not such an application; in devices and this is not yet known by the licensing agency. Then,
content protection, it is a positive advantage that only the the attackers will know the keys for one or more of the subsets in
licensing agency can produce a valid MKB. In this paper I will use in the most recent MKBs. They can modify an MKB and it
assume that “broadcast encryption” means “symmetric-key will be convincing to those devices that are in the same subset(s)
broadcast encryption”. of the device(s) they have compromised. However, the licensing
agency controls the number of subsets in the MKBs, so they can
Why worry about the performance of symmetric-key make sure that this attack does limited economic damage.
cryptography versus public-key cryptography? There is an
argument that says that over time, devices get more powerful, and A second rule also mitigates against this attack: if a device
even significant differences like 1000x will be overcome by encounters two conflicting attestations from different MKBs, then
improved silicon. That might be true, but it also seems like each it should believe the MKB in which it is in the smaller subset. It is
new silicon advance leads to a new class of devices that are near best to explain this with an example. Suppose the “message” the
the limit of the technology, where issues like battery life and licensing agency is attested to with a given MKB is the version
delay times are directly affected by calculation overhead. number of the MKB, and the system is at version 10. The
attackers compromise some devices and modify version 10 MKBs
The remainder of this paper is organized as follows. Sections so they are now version 1000. Those devices in the system that
2, 3, 4, and 5 describe new advances in broadcast encryption. are in the same subsets that the attackers have compromised find
Section 6 discusses some disadvantages of broadcast encryption these new MKBs valid; however, all the other devices in the
compared to public-key cryptography. Section 7 is the conclusion. system do not, so this is mainly a denial of service attack. The
licensing agency examines the fake MKB and sees which subsets
2. THE “SIGNATURE-LIKE” PRIMITIVE have been compromised. It releases new MKBs at version 11,
Broadcast encryption is inherently anonymous. Any where those compromised subsets have been subdivided—
uncompromised device can process an MKB and come up with perhaps even down to individual devices. Devices that accepted
the same key. That key does not identify them, but possession of
that key proves they are compliant. A device can authenticate a 5
message using a message authentication code (MAC) based on This is a slightly different formulation than the one in the
that key. That means that a compliant device authenticated the referenced paper[9], and improves on it. In that original paper,
message, but it does not prove which device made the attestation. after a message had been tampered with, each subset of devices
This might suffice. To return again to our favorite application, if a would still calculate the wrong key, but they would all calculate
recorder attests with a MAC that a recording has “unlimited the same wrong key. In certain situations, attackers might be
able to take advantage of this.

41
the erroneous version 1000 MKB will discard it when they see the SD card could pick a random identifier and the host would be
new version 11 MKB. Even though the version number is less, none the wiser.
they are in a smaller subset so they accept it as the truth. If the Recently, however, a true authentication protocol has been
attackers continue with the attack, they increasingly identify their developed. This has been discussed commercially, but, to my
compromised keys, and the attack affects fewer and fewer knowledge, this is the first time it has been described in an
innocent devices. academic paper. The idea is that each side has access to a
different MKB, and they parse their MKB for the other side. In
other words, they figure out the subset the other side needs, and
Binding Table send only the subset identifier together with the single encryption
MKB “signature”
“Public key”
of the media key that goes with that subset. In order for this work,
+hash E of course, each side has to tell the other what its device identifier
+hash E is, in order for the other device to figure out what subset it needs.
+ E Once this initial exchange of parsed MKBs is complete, then both
hash
devices know the two media keys and use them, together with
k1 k2 k3 . . . kn
nonces, to derive a session key. After the protocol completes, if
one device has a down-level MKB, the device with the more


recent MKB sends it, encrypted in the session key.

With this protocol it is impossible for a device to continually


Km lie about its device identifier, although it might get away with it
+ E one time. When the licensing agency encounters an obvious
hash
circumvention device it observes what device identifier it is
claiming. The agency then produces an MKB where that device is
in a subset all by itself. If the device is telling the truth about what
keys it has (its device identifier), it will be able to process the
Figure 3. An Example Third Party Signature authentication protocol. Then the licensing agency produces a
new MKB that revokes that device. On the other hand, if the
circumvention device has been lying about what keys it has, the
If the broadcast encryption scheme in use has the property
authentication protocol will fail and the test MKB itself is
that the device subsets are disjoint, then there is an easy way to
sufficient to take the circumvention device out of the system.
extend the signature-like mechanism to arbitrary third parties.
Why? The new MKBs will have a higher version number, so
This is not a difficult restriction; all the commercial systems and
compliant will replace their current MKB with a new one as the
all the new schemes have this property. The idea, illustrated in
new MKBs circulate through the system. The circumvention
Figure 3, is that the subsets, instead of all calculating the same
device will no longer be able to authenticate with the updated
media key, calculate instead other random keys Ki, each subset
compliant devices.
calculating its own Ki. The licensing agency produces a set of
MKBs and gives them, and their associated Ki’s, to a third party. 4. TRACING AND FORENSICS
The licensing agency uses its signature-like mechanism to attest The NNL paper[5], in addition to introducing the subset-
to both the version number of the MKB and who it gave it to. In difference broadcast encryption scheme, contained a theorem that
other words, the Ki’s are not correctly calculated if either of those said that tracing the keys used in attack can always be done in any
things is tampered with. The third party then can produce a table broadcast encryption scheme, if the attackers have no memory of
of a media key encrypted with each of the Ki exclusive-or’ed with previous test MKBs. As a practical matter, this means that the
the hash of the message the party wants to attest to. These tables attackers’ device must brought into a lab for testing, where it can
are called binding tables. be reset between tests. The testing method is simply a divide-and-
conquer iteration on the subsets of devices, and it takes O(T3) test
3. AN AUTHENTICATION PROTOCOL MKBs, where T is the number of device identities the attackers
Since the beginning of commercial broadcast encryption
have compromised.
starting with SD cards, there has always been a broadcast-
encryption-based “device authentication” protocol[4]. The host
At the same time, the cryptographic literature abounds with
reads the MKB on the SD card and now both the host and the
discussions of “tracing traitors”[6][7], which is the process of
micro-controller on the SD card know the media key. The host
deducing device keys based not on test MKBs, but on logically-
sends a nonce to the SD card’s controller, and the controller
equivalent-but-detectable variations in the content itself. Most
responds with another nonce. Based on the common media key,
people believed that tracing traitors is an essentially different
the two nonces, and an identifier on the SD card, both sides
process than MKB forensics; for example, current Blu-ray players
calculate a common session key. Protected data is then encrypted
have two sets of keys, one set to process the subset-difference
with the session key across the bus between the host and the card.
MKB on movie discs, and one set of “sequence keys” used for
Technically, though, this is not an “authentication” protocol; a
AACS’s tracing traitors scheme.
better term would be a compliance protocol. Both sides prove
they are compliant and unrevoked, but neither side proves its
This idea turns out to be wrong, but it is understandable why
identity. An unrevoked circumvention device pretending to be an
it persisted so long. In the newest broadcast encryption schemes,
the subset keys are organized in a large tree, and the individual

42
devices are associated with the leaves in the tree. This allows agency is free to pick any four for a given movie. In other words,
unlimited and precise revocation. It also enables the trick used in the sequence key block stored on the movie disc denotes which
the subset-difference scheme, where a subset key is always a one- columns from the key matrix are being used, so that the players
way function of the key used in the next higher subset. However, know which of their 255 keys to use for each column in the key
in a tree scheme, two devices who are siblings on the leaves of the block. The licensing agency can take full advantage of the 255-
tree will have every subset key in common except one. This movie sequence.
seemed very bad for tracing traitors. It seemed much better to
make sure any two devices have as few keys in common as The problem is, in a multi-column key block on a disc,
possible. This suggested that tracing traitor keys should be which movie in the movie sequence does this block correspond
assigned according to a maximal distance separable (MDS) code to? I used to think this problem had a simple solution: the first
like a Reed-Solomon code. In effect, the keys are assigned out of column in the block was the one that defined which movie in the
a matrix as opposed to a tree. That is precisely what AACS did. movie sequence was used. In other words, to carry on with our
example, the 255 uncompromised keys in the first column in the
key block (let us say it column #17 in the key matrix) would
The missing piece, however, was how revocation of keys has
encrypt 255 movie variant keys. The uncompromised keys in the
to work in a matrix-based system. Because of space limitations (in
remaining columns would all encrypt the one remaining movie
both the content variations and in the MKBs themselves), the
variant key. After all, the vast majority (255/256) of players will
number of rows in the matrix is much less than the number of
only need to process the first column, so this seems to maximize
devices. Thus, in a given column, thousands or even millions of
the forensics on this large group. So the multi-column key block
innocent devices might have a compromised key. However, in a
would look like a single column key block; the movie with such a
subsequent column, because of the maximal-separate property,
block would look forensically just like movie #17 in the sequence.
most of those unlucky devices will not have the same key as the
compromised device. For example, in AACS’s MKB-like
Alas, this does not work. What if the attackers respond using
“sequence keys blocks”, many columns of keys are used to
that one remaining movie variant key? The tracing agency can
encrypt the content variation keys. If an innocent device finds its
conclude that the attackers know the compromised key in column
key is compromised in the first column in the sequence key block,
#17—but it knew that already. The attackers had to have used an
it moves on to the second column to find a content variation key.
uncompromised key from one of the other columns, but the
Likewise, if its key is compromised in the second column, it
tracing agency has no idea which. The tracing agency has gained
moves to the third. Eventually an innocent device will find a
precisely zero information from the recovered movie. The
column in which it has an uncompromised key (or else the
attackers can always do this because they know all the
inherent revocation capability of the system has been exceeded).
compromised keys.
To continue with this example, let us say we have one billion
So a licensing agency producing a multi-column key block
players, and the matrix has 256 rows. (In AACS’s terms this
must spread the variant keys across all the columns. In our
means that each movie has 256 variations.) The number of
example, the licensing agency would encrypt only 64 unique
columns in the matrix (let us say that is 255) corresponds to the
movie variant keys in the 255 uncompromised key cells in the
maximum sequence of movies that can be used for tracing. In
first column. In other words, more than one cell would encrypt the
other words, each player stores 255 keys. Now consider the case
same variant key. In effect, this reduces number of variations q;
where there has been an attack and all the keys in one player have
the effective q is q/c, where c is the number of columns. So, the
been compromised. Thus, one key in each column is
very small number of variations that the space allows is reduced
compromised. Assuming that the keys have been assigned with a
even further by revocation. And our example has been the
Reed-Solomon code, any two players have at most three keys in
minimal case; the situation gets much worse as revocation
common. The licensing agency can exclude the compromised
continues over the life of the system and the number of columns
keys with a four-column key block, as follows: the first column in
in the key blocks gets larger and larger.
this block contains 255 encrypted movie variation keys, and one
encrypted intermediate key in the compromised position.
To reduce the effects of the q/c problem, the licensing
255/256th of the players will directly calculate the movie variation
agency can do divide-and-conquer iterations. If the attackers
key; 1/256th (roughly 16 million) of the players will calculate an
respond from a given column, it will not know exactly which key
intermediate key and have to go to a second column. In that
they have, but it knows it is from a limited set. On subsequent
second column, the same fractions apply, and roughly 64,000
movies, the agency can devote more variations to distinguishing
players will have to move on to a third column. In that column, at
keys within that set. But, if the licensing agency is willing to
most 255 innocent players move on to the fourth column. All 255
iterate, what is so wrong with the tree-based scheme, where
players will have uncompromised keys in that column (because of
divide-and-conquer is essential? The answer is nothing is wrong;
the Reed-Solomon code). The one compromised key in that
in fact, it does not take many revocations before a tree-based
column will contain a random encryption, so attackers who only
scheme performs better than a matrix-based one. A tree-based
have compromised keys will not be able to calculate a movie
scheme never has a q/c problem because any two subsets in a tree
variation key.
are either disjoint or one is a proper subset of the other.
To be clear, when I say “first, second, third, and fourth”
columns, I do not necessarily mean the first four columns in the It now seems unnecessary to have two different key
key matrix. Of the 255 columns in the key matrix, the licensing management systems, one matrix one for tracing traitors and one

43
tree-based one for bulk encryption of the content. In fact, there content because it is a higher security class and can process the
does not seem to be any significant difference between broadcast same MKB and get a media key precursor. In a public-key-based
encryption and tracing traitors[11]. The two can be combined in a system, to pass the content on in a useful way, the original device
single MKB. AACS calls this a “unified MKB” and their Final would also have to pass the key to decrypt the content and thus
Specification[3], released in 2009, allows manufacturers to would have to know it.
produce new type of player (“Class II”) that does not have
sequence keys. Instead, the variant keys they need are in a Why would a device that possesses content not be allowed to
subset-difference MKB. This MKB looks very much like the decrypt it? Actually, this happens quite frequently. Storage
MKBs used for signatures (see section 2), and the two devices are the classic case. Internet lockers, Internet edge
mechanisms can be easily combined. The different subsets servers, and flash memory card microcontrollers have no need to
calculate Ki’s, which act as variant keys to unlock the different decrypt the content that is stored on them, but usually need to be
variations in the content. A table that looks exactly like a binding authenticated to participate in the system. Broadcast encryption
table allows devices to use their variant key to calculate the security classes are perfect for this.
common media key that protects the bulk of the content.
6. DISADVANTAGESS OF BROADCAST
I started this section talking about the standard in-the-lab ENCRYPTION
approach to determine an attacker’s keys using test MKBs. Using In 2007, Kiayias and Pehlivanoglu described an attack[8]
these unified MKBs is substantially better than using standard 6
they called the Pirate Evolution Attack . Reading between the
MKBs with their O(T3) forensic algorithm, at least in a content lines, it was clear that the authors thought it meant the death knell
protection application where it is possible to use variations in the to broadcast encryption. In this attack, the attackers, instead of
content. As shown in [10] and [11], using the variations, the deploying all the subset keys in all the devices they have
number of tests required is O(T) to determine all the T devices the compromised, just deploy a single key that is in use in the current
attackers have compromised. version MKB. After the licensing agency responds revoking that
key, the attackers deploy another key. The authors claimed that,
It is worth noting that public-key cryptography has no especially in the case of AACS’s subset-difference scheme, a
equivalent function to tracing traitors. If a content protection single compromised device would invoke hundreds of generations
application needs to identify attackers based on variations in the of revoke/response actions before the effects of the single attack
unauthorized copies of content, it needs to set up a separate key were completely eliminated.
domain for that purpose, with its own revocation mechanism. The
recent advances suggest that the best type of tracing traitors key The fallacy with their analysis was that they assumed that the
domain is tree-based, which is also ideal for broadcast encryption, licensing agency must produce minimal-size MKBs. Of course, it
which can take over the role that the public-key infrastructure was does not. If suffering this attack, the licensing agency simply
performing. So, why would such a system ever choose public-key creates MKBs where the attacked subset has been significantly
cryptography? subdivided. This greatly reduces the number of keys the attackers
can use in the next generation. For example, in the case of AACS
5. SECURITY CLASSES with an MKB of 64 KB (which is not very large considering the
It turns out that there is at least one other recent broadcast-
Blu-ray discs can store 50 GB), at most two generations are
encryption advance that has no exact analogue in public-key
required to eliminate the attack from a single device. It is clear, in
cryptography. The idea is called security classes[12]. Basically, in
the sixteen years since broadcast encryption was first described,
an MKB supporting security classes, some of the subsets calculate
no fundamental flaw has yet been found.
the media key as before. Other subsets, however, whose devices
are in a higher security class, calculate a media key precursor.
However, there is a problem with broadcast encryption
They then apply a one-way function to derive the media key. All
compared with public-key cryptography. In our original magazine
the devices in the systems can interact based on the media key,
article we called it the “single score problem”. Basically, if the
but some devices can have additional privilege because they also
nature of an application is such that the attackers can gain a
know the media key precursor. Any number of security classes
significant advantage by a single transaction with the system,
can be defined, with higher classes calculating the keys for all the
broadcast encryption is inappropriate. For example, it would not
classes below with one-way functions. This does not conflict with
be appropriate for a banking application. The forensic
the signature mechanism; the precursor keys can be introduced in
mechanisms built in to broadcast encryption schemes, although
the binding table instead of the MKB itself.
they have been greatly improved recently, still require multiple
iterations with the attackers to reveal the keys being used. In the
Public-key cryptography has a similar feature, but it is not
“attack once and then leave the system” scenario, the attacker in a
quite as flexible. A public-key certificate can describe the
broadcast encryption system, although he may be identified down
permissions of a device. For example, in the Digital Transmission
to a subset, is otherwise anonymous. In a public-key-based
Content Protection (DTCP) protocol, recorders are marked as
system, the attacker would have had to have presented credentials,
such in their certificates. A source device will not send “do not
and proven that he had the keys associated with those credentials.
copy” content to a device identified as a recorder. What security
classes enable, in addition, is a device which can receive content
6
over an authenticated channel and pass it on to another device, Paul Kocher had earlier independently discovered this attack had
without ever having the key that would allow it to decrypt it. described it confidentially to the Hollywood studios. He called
Nonetheless, the device further down the chain can decrypt the attack the Key Rationing Attack.

44
Of course, even in a public-key-based system, revocation would [2] Fiat, A., and Naor, M. 1994. Broadcast encryption.
be ineffective (the attacker was not planning a second attack). Advances in Cryptology (Crypto 93). Lecture Notes in
However, there might be an opportunity to seek legal remedies Computer Science 773, 1994. Springer-Verlag, pp 480-491.
against him because his identity is known. [3] http://www.aacsla.com/specifications
[4] http://www.4centity.com
In the content protection application, it is hard to imagine
that a single attack can cause significant damage. Certainly, a [5] Naor, D., Naor, M., and Lotspiech, J. 2001. Revocation and
single unauthorized copy has negligible impact on the system as a tracing routines for stateless receivers. Advances in
whole. What hurts these systems economically are systematic Cryptology (Crypto 2001). Lecture Notes in Computer
attacks like ripping programs which convert the content to Science 2139. Springer-Verlag, 2001. pp 41-62.
cleartext and Internet file sharing sites which distribute the [6] Chor, B., Fiat, A., and Naor, M. 1994. Tracing traitors.
content freely. In these cases, there is ample opportunity for the Crypto '94, Lecture Notes in Computer Science, Springer-
broadcast encryption forensics to work effectively. Verlag, Berlin, Heidelberg, New York, volume 839, 1994.
[7] Chor, B., Fiat, A., Naor, M., and Pinkas, B. 2000. Tracing
7. CONCLUSIONS traitors. IEEE Transactions on Information Theory, 46, 2000.
I have often wondered what would have happened had
broadcast encryption been invented first, and public-key [8] Kiayias, A. and Pehlivanoglu, S. 2007. Pirate evolution: how
cryptography came along later. Would broadcast encryption have to make the most of your traitor keys,” Advances in
become the first choice of system designers, and public-key Cryptography – CRYPTO 2007, Lecture Notes in Computer
cryptography being the more expensive alternative needed only in Science, Springer Berlin, 2007. pp 448-465.
certain applications? During the course of developing AACS, we [9] Lotspiech, J. 2007. A signature-like primitive for broadcast-
had an opportunity to use the “signature-like primitive”. encryption-based systems. Consumer Communications and
However, in the end, we decided against it, the major reason Networking Conference, 2007, Jan. 2007. pp 1042 – 1047
being “it was too hard to explain to the studios”. By any objective
measure, of course, this is nonsense. I hope, in the few paragraphs [10] Jin, H., Lotspiech, J., and Meggido, N. 2008. “Efficient
I devoted to it, I was able to convey the gist of how the signature- coalition detection in traitor tracing. In Proceeding of IFIP
like primitive works. How many paragraphs would it have taken, International conference on Information Security 2008, Sept
starting from scratch, to have explained the elliptic curve Digital 8-10, 2008, Milan, Italy.
Signature Algorithm, which AACS eventually used? In another [11] Jin, H., and Lotspiech, J. 2009. Unifying broadcast
sense, however, the reason was apt. ECCDSA is accepted as a encryption and traitor tracing for content protection. IBM
given building block by system designers who only have the Technical Report RJ10477, June, 2009. Available from
fuzziest idea of the math involved. My goal with this paper was to http://domino.research.ibm.com.
make a start with broadcast encryption, so that its primitives, too, [12] Jin, H., and Lotspiech, J. 2009. Broadcast encryption for
might someday achieve the same given status as public-key differently privileged. IFIP International Conference on
cryptography. Information Security (SEC'09) , May 18-20, 2009, Cyprus.
8. REFERENCES [13] Dodis, Y., and Fazio, N. 2002. Public key broadcast
[1] Lotspiech, J., Nusser, S., and Pestoni, F. 2002. Broadcast encryption for stateless receivers. ACM Workshop on Digital
encryption’s bright future. Computer, 35(8), Aug. 2002, pp. Rights Management, November, 2002.
59-63.

45

View publication stats

You might also like