Skip to main content

Cryptography, DRM and You

Image used with permission by copyright holder

We talk about DRM quite often. Technically it stands for Digital Rights Management, but we did have a listener recommend we try to change that to Digitally Restricted Media. The point of DRM is to protect digital media files from piracy. The actual result of DRM is a lot of frustration for those who just want to watch movies and listen to music.

Today’s Show:

News:

Other:

Cryptography, DRM and You

We talk about DRM quite often. Technically it stands for Digital Rights Management, but we did have a listener recommend we try to change that to Digitally Restricted Media. The point of DRM is to protect digital media files from piracy. The actual result of DRM is a lot of frustration for those who just want to watch movies and listen to music.

We recently read about a vulnerability discovered in OpenSSL that could have an impact on DRM in consumer electronics. OpenSSL is a freely available software package used in countless different products to protect sensitive information, which could include movies and songs that the content owners don’t want to have freely available on the Internet.

Before we get into the actual vulnerability, the flaw in the OpenSSL software, we need to provide a little background on Cryptography and how it applies to DRM. We’ve talked about how plasma TVs and LCD TVs work in the past. So along those lines, we’re going to get a little geeky on how DRM works

What is Cryptography?

So in a nutshell, cryptography is a big umbrella that describes many different ways to protect information or keep a secret. Remember Ralphie’s decoder ring in A Christmas Story? Yep, that was cryptography. The secret there was the phrase “Be sure to drink your Ovaltine.” The secret in DRM is the actual audio or video file that is useless unless you know how to decode it so you can play it back.

Keys

Imagine cryptography as a box. You have to have a key to lock something inside the box so you can keep it secret. You also need a key to open the box to reveal the secret. There are two ways to do this. With symmetric key cryptography, you use the same key to lock and unlock the box. With asymmetric cryptography, one key can lock the box, but a different one must be used to unlock it.

Asymmetric key algorithms are more secure. Everyone keeps their ‘private’ key safe, and provides only their ‘public’ key to the world. If I want to send you a message, I can lock it with your public key because I know that you’re the only one who can open it, because you’re the only one with your private key. These algorithms are more secure, but they also require a lot more processing power, making them less than ideal for audio and video playback.

When you’re playing an audio or video file, you have to decode it quickly so that you don’t get any stuttering or delays in the content. Symmetric key algorithms require less processing horsepower. That’s why the DRM scheme chosen for Blu-ray, called Advanced Access Content System (AACS), chose a symmetric encryption algorithm (they use AES, Advanced Encryption Standard).

You can pretty quickly realize that it’s not the encryption or the algorithm or any of that stuff that really matters. What really matters is protecting your keys. If a key gets published on the Internet, anyone can use it to decrypt any Blu-ray movie and essentially post DRM-free copies of full quality content. Without getting into too much detail, AACS has a way to create unique keys for devices that can be turned off if they’re compromised, but that still doesn’t solve the problem.

The Vulnerability

So what exactly was this vulnerability in OpenSSL? When you hear it, you may get a little chuckle. Evidently scientists from the University of Michigan found a way to read tiny pieces of a private key by injecting slight fluctuations in a device’s power supply as it was processing encrypted messages. It took a little over 100 hours, but eventually they were able to get the entire 1024-bit key.

This may not really impact you all that much, if you see a bunch of people around your Blu-ray player with lasers and a rack of servers, ask them politely to leave. And, to be honest, it isn’t even the easiest way to crack Blu-ray. The tried an true method is to use a software based Blu-ray player on any computer and simply examine what’s in memory while the player is running. At some point the software player will need to put the key in memory to use it, and you can grab it.

But what it shows is that no matter what you do to protect your digital content, someone with enough determination can find a way to break it. In this case an $80 Blu-ray player and a little over 4 days of Jolt cola and power fluctuations cracks every Blu-ray disc on the market. So even if you push Blu-ray decryption to hardware on a PC, it can still be cracked.

Why does it matter?

So the real question is, why does any of this matter to any of us? Bottom line, those of us who follow the rules don’t spend 4 days shining a laser on our Blu-ray player so we can crack it and distribute pirated movies. Those who don’t care about the legalities of content protection are going to do it no matter what the rules say.

So piracy still happens, DRM or not, there will always be pirated copies of movies and music available on the Internet. But for those of us who don’t pirate content, we get the shaft trying to figure out why the movie we just bought won’t play on our laptop or the TV show we just bought won’t stream to our media center extender.

The only people who get punished are the ones who follow the rules. We think DRM should simply be a thing of the past. If content owners want to charge for content, provide a service worth charging for. Make it super easy to find what we want. Make the downloads or streams incredibly reliable. Make the service something worth coming back to. It worked for iTunes. Despite every song available there being available for free elsewhere on the Internet, people still buy songs from iTunes.

Abolish DRM, free the content, stop punishing everybody for the transgressions of a few. Besides, you aren’t even stopping those few, so what’s the point?


HT Guys

HTGuys.com

Editors' Recommendations

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
TWB Podcast: SpaceX triumph, Spotify vs. Apple Music, Apple Watch health
trends with benefits spacex tesla spotify apple watch twb full

SpaceX has reinvigorated space exploration: There can be no doubt that putting a cherry red Tesla Roadster into space, as part of the Falcon Heavy X rocket launch on 2/ 5/18, captured the world's attention. It showcased what vision, ability, talent and a whole lot of money, can accomplish. The question now is what will Elon Musk do next? One would imagine that investors are clamoring to pour more money into future projects. This was also the world's greatest ad campaign for Tesla, for which there are some pretty bold plans in their own right. A letter was sent to shareholders stating that they are planning to send an autonomous Tesla car on a coast-to-coast trip in 2018.

Spotify vs. Apple: When it comes to overall users, there is no question that Spotify is the current leader in streaming music services. They have millions more subscribers (approximately 70 million total) than their closest rivals. However, Apple Music is now claiming to have 36 million of their own and according to the Wall Street Journal, is growing at nearly double the rate of Spotify. So, who do you use for streaming music and why?

Read more
Between the Streams: Venomless trailer, Game of Thrones Star Wars, ‘Solo’ time
between the streams

DT’s weekly entertainment show, Between the Streams, is your guide to all of the hottest, most important, and (of course) dumbest new developments in streaming and entertainment, providing a handy recap of the week that was and a preview for what's ahead. Follow us here at 2 p.m. PT every Friday, or add us via RSS, iTunes, or Stitcher at the links below to take BtS on the road!

      

Read more
How to photograph ghosts — get an iPhone (Samsung cameras won’t work)
how to photograph ghosts julie rieger crabman color circled

Forget selfies and sunsets, any ordinary iPhone can be used to take pictures of something far more intriguing: the spirit world.

Julie Rieger is the biggest of Hollywood bigwigs; she’s president, chief data strategist, and head of media at 20th Century Fox, where she’s worked on a few little films like Avatar, Deadpool, The Fault in Our Stars, and more. And in addition to being one of the nicest people you’ll ever meet, she’s an avid ghost photographer -- in fact, she wrote the book on it.

Read more