The scene (1)

Content security
Ecole d’été RESCOM 2006
DIEHL
Eric
Technology, Corporate Research, Security Domain Manager
12 June 2006
What is content security about?
Mitigate
Identify
Protect
theft of
source
content
leakage
Eight laws to rule
I
II
III
IV
V
VI
VII
VIII
Law 1: Pirates will always find a way

Examples
– DeCSS unprotected DVD since 1999
– Sony Key2Audio and the lethal pen
– Pay TV cards have always been broken

Design with mandatory renewability
– Smart card

Find the hole
– Track illegal activity
– Watermark
CP
Law 2: Know the assets to protect

Examples
– Wrong asset
– Useless protection

Threat analysis
– What to protect
– Who are the attackers
– Identify the attacks, the consequences and the risk
Law 3: No security through obscurity

Example
– Walmart’s cart
– Selection process of AES
Sound cryptography
 Kerckoff’s law

– Security should rely on the secrecy of keys and not
on secrecy of algorithms
Law 4: Trust no one

Example
– ATT report
 2/3

of content leakage done by insiders!
Simplify the trust model
– The less you need to trust, the more secure you are
BYERS S., et al., Analysis of security vulnerabilities in the movie production and distribution
process, ATT Labs, September 2003 available at http://lorrie.cranor.org/pubs/drm03.html
Law 5: Si vis pacem, para bellum

Example
– DirecTV counter attacks
If you want peace,
prepare war
Know your enemy
 Change the target
 Multiple defenses

– Combination of encryption and watermark
– Physical security and encryption
Law 6: You are the weakest link

Examples:
– Password jeopardy
– Phishing

Social Engineering
–

MITNICK K., The art of deception, WILEY, 2002
Security must be transparent
A2783E67BFA39C60DF234E79FD45E93F
A2783E67BFA39C60DF234E7BFD45E93F
Law 7: Security is not stronger than the
weakest link

Example
– High robustness security locks on a thin wooden
door
– Constant failure of Copy Protection for CD-A
– Side Channel Attacks
Design of security from the start
 Strengthen the weakest element

Law 8: Security is a process, not a
product

Examples
– Day-to-day patching process
– Best firewall with default admin password

Security is global
– Secure system A + secure system B is not a secure
system
Security policy is mandatory
 Certainty is a weakness

An example: NexGuard™
Encrypt
content
Decrypt &
watermark
content
Create &
encrypt
licence
Decrypt
licence
An example: NexGuard

Si vis pacem, para bellum
– Encryption, and watermark
– Possible revocation of every element

You are the weakest link
– Transparent for user

No security through obscurity
– Use of proven cryptography (AES, RSA)
– Keys are stored in secure cards

Trust no one
– A very limited set of assumptions
An example: NexGuard

Pirates will always find a way
– Smart card allows renewability

Know the assets to protect
– Only protect content

Security is not stronger than the weakest link
– Special effort in the design of the product

Security is a process, not a product
– Help the customer to design its security policy
 Best
practices, guidelines, …
Conclusions

Piracy is a reality

BUT

A toolbox already exists

Many fields open for academic/industrial research
– Cryptography
– Watermark
– Fingerprint
– Smart cards
– Policy enforcement and definition
– Formal proof of security
–
…
Thank you for your attention
This document is for background informational purposes only. Some points
may, for example, be simplified. No guarantees, implied or otherwise, are
intended