M262 Putting Computers Systems to Work

T325: Technologies for digital media
Second semester – 2011/2012
Block 2 – Intellectual Property and Security Issues
Arab Open University – Spring 2012
1
INTELLECTUAL PROPERTY
RIGHTS
Arab Open University – Spring 2012
2
• Digital technologies made easier the production and
distribution of works (music, films, etc.)
• Large proportion of incomes of entertainment industry
comes from selling copies of digital work
• Entertainment industry feels threatened by illegal copying
and distribution
• The way intellectual property rights are interpreted and
enforced will have a significant impact on how digital
works are distributed in the future, both in an electronic
form or in a storage medium
Introduction
Arab Open University – Spring 2012
3
• Intellectual property (IP) takes several different forms
• IP-Related laws attempt to balance the interests of
different parties.
• There is no universally agreed balance
• Laws change to reflect the changes in the views of
dominant players and changes in technologies.
• Intellectual property (IP) can allow you to own things you
create in a similar way to owning physical property.
Introduction
Arab Open University – Spring 2012
4
• The term ‘intellectual property’ is commonly used to
refer to the actual invention or creative work, and also to
the rights associated with the works.
• Types of intellectual property
• Copyright : protects material, such as literature, art, music,
sound recordings, films and broadcasts.
• Designs : protect the visual appearance or eye appeal of
products.
• Patents : protect the technical and functional aspects of
products and processes.
• Trademarks : protect signs that can distinguish the goods
and services of one trader from those of another.
What is Intellectual Property (IP)?
Arab Open University – Spring 2012
5
• Comparison of Intellectual Property to physical
property is highly contentious.
• knowledge is non-rivalrous.
• If I have an idea and I tell it to another person, then I can
still have that idea -- we are not rivals in the possession of
the same idea.
• This is not the case with rivalrous objects; if I give someone
a pair of my shoes, then I can no longer wear those same
shoes.
• Intellectual property is treated in law differently to
physical property:
• Certain exclusive rights awarded to owners of intellectual
property are time limited, after which the works are
considered to be in the public domain.
Intellectual Property vs. Physical Property
Arab Open University – Spring 2012
6
• Intellectual property rights can be described as an attempt
to establish a trade-off between rewarding individuals and
benefiting society
• The owners of intellectual property can be organizations,
not only individuals
• Three main stakeholders:
• Creators, commerce and the public.
• Intellectual property is characterized as a bundle of rights.
• Examples of the rights associated with a novel : to produce
a printed edition for sale in particular countries, to translate
it, to film it, to adapt it for the stage, and so on.
• The word ‘instrument’ describes the recognized forms of
intellectual property.
Definition of intellectual property
Arab Open University – Spring 2012
7
• Rights can be disposed
• Example: pass some of these rights to a publisher through a
signed contract
• Economic exploitation of the novel is only possible by
someone who holds the right to do so.
• Rights can be fragmented and traded
• Allows many freelance creators (novelists, lone inventors or
software creators) to generate money from their work
• Copyright between Employee and Employer
• contracts of employment usually state that the rights in any
creative work done as part of their employment are
automatically the property of their employer.
Definition of intellectual property
Arab Open University – Spring 2012
8
• Exceptions to copyright legislation are generally a
recognition that users or consumers should be able to do
certain things with copyrighted works, to a limited extent
or in special circumstances, that copyright legislation
forbids when performed on a larger scale or in other
circumstances.
• The exceptions to copyright legislation generally come
under the heading of ‘fair dealing’.
• research and private study.
• criticism, review and news reporting.
• incidental inclusion of copyright material.
Rights and exceptions of copyright
Arab Open University – Spring 2012
9
• The Creative Commons movement has looked for a
remedy that does not discard the concept of copyright.
• The movement envisages copyright as a set of explicit
permissions rather than an implicit prohibition.
• Most intellectual property rights are covered by civil law,
however, Because of the large impact intellectual
property infringement has on the economy in the UK,
some infringements of intellectual property rights when
done on a large scale are criminal offences  Selling a
fake DVD!
• The term of copyright is at present too long
• Some economists argue that the optimal term of copyright is
at most 7 years, other consider a term of 25 years
•More on intellectual property
Arab Open University – Spring 2012
10
• Creators can choose among or a combination of four
license elements
Arab Open University – Spring 2012
11
Software piracy -results of 2006
Global Software
Piracy Study,
figures for
European Union
countries
12
SECURITY
Arab Open University – Spring 2012
13
• Now, we shall look at some of the technologies employed
to make infringement of copyright more difficult.
• Security of intellectual property involves both access
control and copy control.
• Some of the restrictions imposed by copyright holders go
beyond the exclusive rights provided by copyright laws
 licenses
• In most forms of security attack the attackers do not have
access to the unprotected versions of the data being
protected. However, attackers of copyrighted works may
have legitimate access to unprotected versions of works
 Purchasing a DVD
Introduction
Arab Open University – Spring 2012
14
•
•
•
•
Principles of encryption
Vulnerability to attack
Integrity
Authentication
Security techniques
Arab Open University – Spring 2012
15
• An encryption algorithm and all its possible keys,
plaintexts and cipher texts is known as a cryptosystem or
cryptographic system.
Principles of encryption
Arab Open University – Spring 2012
16
• Cryptography is the art and science of keeping messages
secret.
• Requirements for cryptography: It should be
computationally infeasible to derive:
• Plaintext from the cipher text without knowledge of the
decryption key
• Cipher text from the plaintext without knowledge of the
encryption key.
• Types of cryptographic systems
• Symmetric or shared key systems systems
• Asymmetric or Public key systems.
Cryptography
Arab Open University – Spring 2012
17
• Sharing a single secret key between the two
communicating entities  used for both encryption and
decryption.
• In practice, the encryption and decryption keys are often
different but it is relatively straightforward to calculate
one key from the other
Symmetric key systems
Arab Open University – Spring 2012
18
• Derive a formula for the number of shared keys needed in
a system of “n” communicating entities.
• Each entity in the network of “n” entities requires a
separate key to use for communications with every other
entity in the network, so the number of keys required by
each entity is: (n -1)
• But each entity shares a key with another entity, so the
number of shared keys for each entity is: (n-1)/2
 In a system of “n” communicating entities the number
of shared keys required is: n x (n-1)/2
Symmetric key systems - Activity
Arab Open University – Spring 2012
19
• Encryption can be done either on blocks of data or on
continuous streams
• Two types of symmetric key systems
• Block cipher
• Stream cipher
Symmetric key systems
Arab Open University – Spring 2012
20
• A block cipher operates on groups of bits: typically
groups of 64.
• If the final block of the plaintext message is shorter than
64 bits, it is padded with some regular pattern of 1s and
0s to make a complete block.
• Block ciphers encrypt each block independently
• A block of plaintext will always encrypt to the same
block of cipher text provided that the same algorithm and
key are used
Symmetric key systems – Block cipher
Arab Open University – Spring 2012
21
• A stream cipher [unlike a block cipher] generally operates
on one bit of plaintext at a time, although some stream
ciphers operate on bytes.
• A component called a key stream generator generates a
sequence of bits, usually known as a key stream.
• In the simplest form of stream cipher, a modulo-2 adder
(exclusive-OR or XOR gate) combines each bit in the
plaintext with each bit in the key stream to produce the
cipher text.
• Stream ciphers can be classified as
• Synchronous
• Self-synchronizing
Symmetric key systems – Stream cipher
Arab Open University – Spring 2012
22
Encryption
Decryption
Symmetric key systems – Stream cipher
Arab Open University – Spring 2012
23
• In a synchronous stream cipher, the key stream output is a
function of a key, ONLY, and is generated independently
of the plaintext and the cipher text.
• A single bit error in the cipher text will result in only a
single bit error in the decrypted plaintext
Synchronous stream cipher
Arab Open University – Spring 2012
24
• In a self-synchronizing cipher, the key stream is a
function of the key and several bits [n] of the cipher
output.
• Because the key stream outputs depend on the previous
“n” bits of the plaintext or the cipher text, the encryption
and decryption key stream generators are automatically
synchronized after “n” bits.
• However, a single bit error in the cipher text results in an
error burst with a length dependent on the number of
cipher output bits used to compute the key stream.
Self-synchronising cipher
Arab Open University – Spring 2012
25
Self-synchronising cipher
Arab Open University – Spring 2012
26
Symmetric key systems: Examples of
Commercial systems
Arab Open University – Spring 2012
27
• Asymmetric or public key systems are based on encryption
techniques whereby data that has been encrypted by one key
can [ONLY] be decrypted by a different, seemingly unrelated,
key.
• One of the keys is known as the public key and the other is
known as the private key  related to each other
mathematically  The relationship is complex  it is
computationally infeasible to calculate one key from the other.
• Each communicating entity will have its own key pair:
• private key will be kept secret
• public key will be made freely available
• Using asymmetric key systems with “n” communicating
entities, the number of key pairs required is “n”.
Asymmetric key systems
Arab Open University – Spring 2012
28
Asymmetric key systems: Examples of
Commercial Systems
Arab Open University – Spring 2012
29
• All the symmetric and public key algorithms listed
previously share the fundamental property that their
secrecy lies in the key and not in the algorithm.
• This is generally known as Kerchoff’s Principle, after the
Dutchman who first proposed it in the nineteenth century.
• This means that the security of any system using
encryption should not be compromised by knowledge of
the algorithm used.
Vulnerability to attack
Arab Open University – Spring 2012
30
• Cryptanalysis is the science of breaking a cipher without
knowledge of the key (and often the algorithm) used.
• Its goal is either to recover the plaintext of the message or to
deduce the decryption key so that other messages encrypted
with the same key can be decrypted.
• One of the more obvious attacks is to try every possible key
(i.e. the finite set of possible keys, known as the key space)
until the result yields some intelligible data.
• This kind of attack is known as a Brute Force Attack.
• Clearly, the greater the key space, the greater the immunity to
a brute force attack.
Cryptanalysis
Arab Open University – Spring 2012
31
• Assuming you could process 1012 key attempts per
second, calculate how long it would take to search the
keyspace of a 56-bit key. Compare this with the time
needed to search the keyspace of a 128-bit key.
• A keyspace of 56 bits provides 256 = 7.2 x 1016 possible
keys. At a rate of 1012 keys per second it would take
approximately 7.2 x 104 s or about 20 h to try every key.
• A keyspace of 128 bits provides 2128 = 3.4 x 1038
possible keys. This would take approximately 3.4 x 1026 s
or about 1019 years. (Note: the lifetime to date of the
universe is thought to be of the order of 1010 years!)
Cryptanalysis - Activity
Arab Open University – Spring 2012
32
• Which of the two types of cryptographic systems is
better : Symmetric or Asymmetric?
• A major advantage of asymmetric key systems over
symmetric key systems is that no exchange of a secret
key is required between communicating entities.
• In practice, public key cryptography is rarely used for
encrypting [entire] messages for the following reasons:
• Security: it is vulnerable to chosen plaintext attacks.
• Speed: encrypting data with public key algorithms generally
takes about 1000 times longer than with symmetric key
algorithms.
• Instead, a combination of symmetric and asymmetric
key systems is often used
Hybrid systems
Arab Open University – Spring 2012
33
• Integrity: relates to assurance that there has been no
unauthorized modification of a message and that the
version received is the same as the version sent
• Why encryption alone does not provide a completely
workable solution for integrity ?
• Encryption process carries overheads in terms of resources
and for some applications it is preferable to send data in the
clear.
• Some network management protocols separate the
confidentiality and integrity functions, so encryption is not
always appropriate.
 Concise identity of the original message is needed to
check against the received message to reveal any possible
discrepancies between the two  Message digest
Integrity
Arab Open University – Spring 2012
34
• Message digest: consists of a small, fixed-length block of
data, also known as a hash value, which is a function of
the original message.
• The hash value is dependent on all the original data  it
will change even if only one bit of the data changes
• The hash value is calculated by applying a mathematical
function, known as a hash function, which converts a
variable-length string to a fixed-length string.
• It is easy to compute a hash value for a given input string,
but extremely difficult to deduce the input string from the
hash value  one-way hash functions
Integrity
Arab Open University – Spring 2012
35
• A message authentication code is similar to a one-way
hash function and has the same properties, but the
algorithm uses the additional ingredient of a secret key,
and therefore possession of the key to perform the check
is necessary.
• Authentication: the process of verifying an identity
claimed by or for a system entity
• Authentication is needed to provide some assurance about
the source of a message: did it originate from the location
it appears to have originated from?
Authentication
Arab Open University – Spring 2012
36
• Some additional assurance is required that irrevocable
binds together the true identity of a person with a public
key.
• This assurance can be provided by a trusted third party,
known as a certification authority  independent
companies (such as Verisign)
• The certification authority knows only the public key of
the entity and not the private key, which should of course
be kept secret at all times.
Authentication
Arab Open University – Spring 2012
37
• Certification authorities form part of what is known as a
Public Key Infrastructure (PKI)
• PKI: is a combination of services and encryption
techniques that together are used to protect the security of
data over networks.
• A PKI includes
• a registration authority, which checks and verifies the
credentials of a user before a digital certificate can be issued
• a certification authority that issues and verifies digital
certificates
• directory services for the publishing of public keys and
certificates
• certificate management and key management services.
Digital certificate
Arab Open University – Spring 2012
38
Public key infrastructure
Arab Open University – Spring 2012
39
• Three examples
• DVD player for pre-recorded DVDs: Content Scrambling
System (CSS)
• Digital video broadcast (DVB) conditional access
• Windows Media Player.
Media players
Arab Open University – Spring 2012
40
• Each DVD player has a set of secret player keys that can
be used to play any DVD
• 409 player keys is provided
• Has a table stored in a hidden area that has encrypted
versions of the disc key
• In addition, each disc has stored another version of the
disc key  encrypted with the disc key itself
• The DVD player will select one of its player keys and
decrypt the corresponding entry in the table  If the
result is the value of the disc key  DVD player has
correctly obtained the disc key
Content Scrambling System (CSS)
Arab Open University – Spring 2012
41
• Each disc also contains an encrypted version of the title
key for each work stored on the disc encrypted with the
disc key  Once the title key has been found it can be
used to decrypt the actual content of each sector of the
disc (MPEG-2 version of a film).
Content Scrambling System (CSS)
Arab Open University – Spring 2012
42
• Some digital television broadcasts are encrypted for pay TV
application  require smart cards
• The most common standard is digital video broadcasting
conditional access (DVB-CA).
• The scrambling system used to encrypt the MPEG-2 encoded
video signal is not a public system and information is available
through non-disclosure licences, which is contrary to the
Kerchoff principle
• The scrambling is based on a secret key and can only be descrambled with knowledge of the value of this key.
• A major difficulty is distributing this key securely to valid
subscribers
Digital Video Broadcasting Conditional Access
Arab Open University – Spring 2012
43
Digital Video Broadcasting Conditional Access
Arab Open University – Spring 2012
44
• Because of the characteristics of their personal keys it
may be possible to group subscribers together and the
same encrypted service key can be decrypted by all the
subscribers in a group, thereby reducing the number of
transmissions necessary.
• The MPEG data for pictures, sound and data are
multiplexed with the encrypted entitlement messages and
are fed into the scrambler.
• However, only the protected picture, sound and data
messages are scrambled, otherwise the receivers will not
be able to access free broadcast programmes and the
encrypted entitlement messages
Digital Video Broadcasting Conditional Access
Arab Open University – Spring 2012
45
• The Microsoft version of DRM
is incorporated in Windows
Media files.
• These files have the file
extension ‘.wma’ for audio,
‘.wmv’ for video, and ‘.asf’
for streaming audio and video.
Basic process for delivering
package Windows Media files
and issuing licences
Windows Media Player
Arab Open University – Spring 2012
46
• Uses a proprietary system to package the digital work in a
secure container, and users cannot access the digital work
in a container without obtaining a licence.
• The secure container comprises an encrypted version of
the digital work, information about the work and how a
licence can be obtained to access the work.
• The licence includes a decryption key to access the digital
work and any conditions on users’ access to the work,
e.g. any limitation on how long they can access the work.
• The licences issued to users may include information
about their computers and thereby limit access to
individual machines.
Windows Media Player
Arab Open University – Spring 2012
47
DIGITAL RIGHTS MANAGEMENT
Arab Open University – Spring 2012
48
• DRM is considered as a set of technologies that
controls the access and use of digital works
• DRM should not be thought of simply as a collection of
technologies.
• The success of a DRM system depends on its technology,
intellectual property laws and business model of the
application
• DRMs have two functions:
• Accountant: DRM ‘watermarks’ can track usage
electronically to report information back to collecting
societies to ensure distribution of royalties is fair
• Policeman: DRM can limit the access to content, for
example, to prevent copying.
Introduction
Arab Open University – Spring 2012
49
• DRM will never be entirely effective, but can remove
temptation for the ‘casual copier’.
• DRMs can almost invariably be circumvented, a legal
framework is needed to prevent unauthorized copying at a
commercial scale
•
(Report of All Party Internet Group (APIG) on DRM published in June 2006)
Introduction
Arab Open University – Spring 2012
50
• People incentives
• Will people buy digital works that have technological restrictions
on their use rather than obtaining a free version that does not have
any technological restrictions?
• Price discrimination
• Non-implementation of fair dealing exceptions
• DRMs can prevent uses permitted under fair dealing exceptions,
and DRM tools do not necessarily expire when the copyright
expires.
• Collateral damages
• DRMs can damage users’ computers and can put limits on what
users can and can’t do with the products
• Non implementation of accessibility features
• DRMs can prevent activities permitted under the exceptions
Problems with DRM solutions
Arab Open University – Spring 2012
51
• Difference between DRM and Copyright laws approaches
• Copyright law  ‘everything that is not forbidden is
permitted’
• DRM  ‘everything that is not permitted is forbidden’
• DRM has been strengthened by recent changes to the law.
• The US Digital Millennium Copyright Act of 1998 and the
2001 EU Copyright Directive make it illegal to bypass
DRM technology, even if the person doing so would
otherwise have the legal right to access the information
behind the digital fence.
DRM and Copyright laws
Arab Open University – Spring 2012
52
• DRM technologies faces a number of obstacles
• Bypassing DRM technologies: it has become commonplace
for new DRM to be cracked (albeit illegally) shortly after its
release and the circumvention codes to be widely distributed
on the internet
• Consumer non-satisfaction: consumers may become
increasingly frustrated with DRM that restricts usage and
presents problems (i.e., as hardware and software need
changing or updating).
DRM Technologies - Obstacles
Arab Open University – Spring 2012
53
ACTIVITY 3.2: THE DARKNET AND THE FUTURE OF
CONTENT PROTECTION (ARTICLE)
Arab Open University – Spring 2012
54
• A darknet is collection of networks and technologies used
to share digital content.
• It is not a separate physical network but an application
and protocol layer riding on existing networks.
• Examples: peer-to-peer file sharing, CD and DVD
copying, and key or password sharing on email and
newsgroups.
• Two types
(a) - “Sneaker Net”
(b) - The World Wide Web
Http
Http
• Fully distributed
• Centralized
FTP
PC
Web
Search
Engine
PC
FTP
http
Search
PC
PC
PC
(c) - Napster
PC
PC
PC
(d) - Gnutella
PC
PC
PC
PC
Napster
Search
Engine
Darknet
TCP /
Napster
Protocol
PC
PC
gnutella
Search
Engine
TCP/UDP
Gnutella
Protocol
PC
PC
PC
PC
PC
PC
PC
PC
PC
PC
Arab Open University – Spring 2012
55
• Input: facilities for injecting new objects into the darknet
• Transmission: distribution network that carries copies of
objects to users
• Output: ubiquitous rendering devices, which allow users
to consume objects
• Database: search mechanism to enable users to find
objects
• Storage: that allows the darknet to retain objects for
extended periods of time.
• Functionally, this is mostly a caching mechanism that
reduces the load and exposure of nodes that inject objects.
Darknet Technological and infrastructure
requirements
Arab Open University – Spring 2012
56
Fully distributed
• Strengths
Centralized
• Single point of failure
• No single point of failure
• Weaknesses
• Free riding
• Lack of anonymity
Fully distributed darknets
Arab Open University – Spring 2012
57
• DRM systems: BOBE (break-once, break everywhere)resistant.
• Suppliers anticipate (and the assumptions of the darknet predict)
that individual instances (clients) of all security-systems, whether
based on hardware or software, will be subverted.
• If a client of a system is subverted, then all content protected by
that DRM client can be unprotected.
• If the break can be applied to any other DRM client of that class
so that all of those users can break their systems, then the DRMscheme is BOBE-weak.
• If, on the other hand, knowledge gained breaking one client
cannot be applied elsewhere, then the DRM system is BOBEstrong.
• DRM renewability: Vendors recognize the possibility of exploits,
and build systems that can be field-updated
BOBE: Break Once Break Everywhere
Arab Open University – Spring 2012
58
• DRM technology components
• License evaluation: software or hardware within the system
that evaluates the license against a requested action,
determines if that action conforms to the terms of the
license, and either allows or blocks that action from
occurring.
• Authentication component to identify the licensee: The
licensee could be a human user or a piece of hardware or
software.
• A way to associate licenses with content.
Activity 3.10: “If piracy is the problem, is DRM the
answer?”
Arab Open University – Spring 2012
59
• Two types of content :
• Managed content : content that is associated with a license
using some technological means
• Unmanaged content: content that does not have a license
associated with it
• If users can somehow convert a managed piece of content
into an unmanaged form, then they can use it in unlimited
ways. In particular, they can share it with other
unauthorized users  Illegitimately transformed
content Dissociated content.
Activity 3.10: “If piracy is the problem, is DRM the
answer?”
Arab Open University – Spring 2012
60
• Secure Container Methods
• Distributing and storing content in an encrypted form and
protecting it indirectly by managing the keys used to decrypt the
content
• Problem: convert managed content to dissociated content The
Analog hole
• Fuzzy Hashing
• fuzzy hashing attempts to compute an identical hash for two
pieces of content if they are perceptually equivalent.
• Ordinary vs. Draconian
• Ordinary DRM: devices handle both managed and unmanaged
content simultaneously.
• Draconian DRM, in which devices that handle managed content
do not handle unmanaged content at all
DRM techniques
Arab Open University – Spring 2012
61
• Based on XML (extensible markup language)
MPEG-21 Rights expression language
Arab Open University – Spring 2012
62
MPEG-21 Rights expression language
Arab Open University – Spring 2012
63
DIGITAL WATERMARKING
Arab Open University – Spring 2012
64
• Digital watermarking refers to techniques for
embedding marks in digital works.
• Digital watermarking does not make the encryption of
digital work more secure, but it does offer additional
protection of tying copyright information to the content in
a secure way.
• It may even be possible for the watermark to survive
digital to analogue conversion.
• Digital watermarking has applications other than
copyright protection.
• Watermarking is not a steganography technique
Introduction
Arab Open University – Spring 2012
65
• Watermarking vs. Steganography
• Steganography: attempts to hide the existence of messages
and is independent of the cover work
• The information contained in a watermark (the watermark
payload) is generally related to the work in which it is
embedded.
• The presence of a watermark is generally known, but the
techniques employed are robust to attempts to remove it.
Introduction
Arab Open University – Spring 2012
66
• Watermarking insertion
Watermarking digital media
Arab Open University – Spring 2012
67
• Watermarking extraction
Watermarking digital media
Arab Open University – Spring 2012
68
• Watermarking detection
Watermarking digital media
Arab Open University – Spring 2012
69
• Imperceptibility (or fidelity) of the watermarking process:
a human listener or viewer should not [be] able to hear or
see whether the cover signal has been watermarked.
• High capacity: The capacity should be high enough for
the intended application of the watermarking scheme.
• Reliability: false negative and bit error rates should be
low
• Robustness
• Tamper resistant (robust to attacks)
• Security should only rely on the secret of keys (following
the well known Kerckhoffs’ principles).
• Cost constraints of the application
Requirements for digital watermarking algorithms
Arab Open University – Spring 2012
70
• The watermark payload should be spread over a digital
work
• For example, a payload of 70 bits can be embedded in each
1 s fragment of a video stream.
• If we assume that a video stream is operating at 1 Mbit/s,
then, in effect, each watermark bit is spread over
approximately 14 000 bits of the original
Watermarking digital media
Arab Open University – Spring 2012
71
• Unauthorised embedding
• Commercial broadcasting
• Fake authenticity: insert a fake watermark after modifying the
work
• Unauthorised detection/extraction
• In some applications it is desirable that the presence of a
watermark cannot be detected without the owner’s authorisation
(Example: medical records)
• Unauthorised removal
• It is possible to distinguish between two types of attack by this
unauthorised action: masking and elimination.
• A masking attack modifies a watermarked work in an attempt to
fool a detector that a watermark is not embedded
• An elimination attack attempts to identify the watermark and
remove it so completely that the resultant work cannot be
distinguished from normally occurring unwatermarked works
Attacks on watermarks
Arab Open University – Spring 2012
72
• Known attacks against digital watermarking
•
•
•
•
Copy attack
Pathological distortion attack
Sensitivity analysis attack
Ambiguity attack
Security of watermarks
Arab Open University – Spring 2012
73
TEST YOUR KNOWLEDGE
(QUESTIONS FROM PREVIOUS EXAMS)
Arab Open University – Spring 2012
74
• Hashing a message and encrypting the message digest with the
sender private key ensures
a. Confidentiality
b. Integrity
c. Non replay
d. Availability
e. All of the above
• Which of the following intellectual property aspects cannot be
categorized as industrial property
a. Patents
b. Trademarks
c. Copyright
d. Designs
e. None of the above
(Final Exam – Fall 2011)
Multiple Choice questions
Arab Open University – Spring 2012
75
• Which of the following is incorrect
a. RSA is an asymmetric key system
b. DES is a symmetric key system
c. Cryptanalysis is the science of breaking a cipher without the
knowledge of the key
d. Hybrid cryptosystems have the security of asymmetric and the
speed of the symmetric key systems
e. MD5 is a hybrid encryption algorithm
• The principle that the secrecy of a cryptosystem lies in the key
and not in the algorithm is known as
a. De Morgan’s principle
b. Moore’s principle
c. RSA’s principle
d. Kerchoff’s principle
e. Schneir’s principle
(Fall 2010 – Final Exam)
Multiple Choice questions
Arab Open University – Spring 2012
76
• The process of verifying an identity claimed by or for a system
entity is called
a. Non repudiation
b. Confidentiality
c. Authentication
d. Identification
e. Integrity
• Which of the following is not included in a public key
infrastructure (PKI)?
a. Certification Authority
b. Registration authorities
c. Directory services
d. Authentication authority
e. Certificate management and key management services
(Fall 2010 – Final Exam)
Multiple Choice questions
Arab Open University – Spring 2012
77
• When the copyright owner of a work is either unknown or
cannot be traced, the work is called
a. Lost
b. Orphan
c. Untraced
d. Unknown
e. Copy-left
• Which of the following is an exclusive right for copyright
owners in UK
a. Copy the work
b. Issue copies of the work to the public
c. Perform, show or play the work in public
d. Make an adaptation of the work
e. All of the above
Multiple Choice questions
Arab Open University – Spring 2012
78
• The category of intellectual property that protect the
technical and functional aspects of products and
processes is known as
a. Trade marks
b. Copyright
c. Designs
d. Patents
e. None of the above
Multiple Choice questions
Arab Open University – Spring 2012
79
• Explain the principle of hybrid cryptographic systems and
show their advantages against pure symmetric and asymmetric
systems. (Final Exam – Fall 2011)
• What are the four categories of Intellectual Property? Explain
each of them in one or two sentences.
• Explain the principle of symmetric and asymmetric encryption
systems. Compare them in terms of speed and security
• What is a hash function? What do we mean by one-way hash
function? And collision free hash function?
• Explain the difference between stream cipher and block cipher
• There are two main requirements for cryptography, explain
both of them.
Short questions
Arab Open University – Spring 2012
80
• Explain the principle of content scrambling system (CSS)
used in pre-recorded DVDs. In your answer, highlight the
use of the following keys: player keys, disc key and title
key. How they are stored and used to encrypt and decrypt
the content of the DVD. (Final Exam – Fall 2011)
• Security techniques relevant to technological protection
of intellectual property include encryption and
authentication, explain how they are applied (Final Exam
- Spring 2010)
• Assuming you could process 10^12 key attempts per
second, calculate how long it would take to search the
key space of a 56-bit key. Compare this with the time
needed to search the key space of a 128-bit key
Long Essay questions / Exercises
Arab Open University – Spring 2012
81
• The computing power of a certain machine is the number of instructions it can
execute per unit of time. The computing power of nowadays personal computers
(2011) is around 4500 MIPS (core i5 Intel processor or equivalent) where MIPS
stand for Millions Instructions per Second. In this exercise we will consider such
computing power in the calculations. Suppose that an algorithm to verify one 56bit DES key needs around 600 elementary instructions. Suppose that we have a
couple of clear text and encrypted text using DES and that we want to find the
encryption key using brute force attack; which means by testing all the keys once
after another.
• We suppose that all keys are equally probable.
• Note: large numbers can be expressed in the form of powers of 2
i. What time it takes for the machine mentioned above to test a key? (3 marks)
ii. What is the number of instructions necessary to find a DES key? Consider the
worst case scenario where all keys should be verified. (3 marks)
iii. What time it takes if the computing power of one billion (109) PCs worldwide
are grouped for this task? (we suppose that all the PCs have the same computing
power mentioned above) (2 marks)
iv. Calculate the time it takes to find a 112 bits triple-DES key supposing that the
number of instructions to test one 3-DES key is the double of a DES key. (2 marks)
Long Essay questions / Exercises
Arab Open University – Spring 2012
82
• Consider the following scenario :
• Alice challenges Bob by sending him some random number.
• Bob encrypts the random number using his own private key
and sends the result to Alice.
• Alice decrypts the message using Bob’s public key (suppose
that Alice has confidence that the public key does indeed
belong to Bob).
• What security service can be assured by this exchange?
Explain your answer.
Long Essay questions / Exercises
Arab Open University – Spring 2012
83