Read full paper at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=50705#.VEmeuVfHRK0
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=50705#.VEmeuVfHRK0
Author(s)
Security information has become so
significant in transmission due to the rapid advancement in digital data
exchange. Thus, it is necessary to protect the confidentiality and
licensing of video content from illegal access. Currently,
High-bandwidth Digital Content Protection (HDCP) provides the
confidentiality and licensing of digital content for High Digital
Multimedia Interface (HDMI). In this paper, we have been able to show
how cryptanalysts have conducted attacks on the HDCP protocol showing
its vulnerability in protecting digital contents. Therefore, the HDCP
scheme is seriously flawed and compromised. Encryption and decryption of
audio/video files were implemented in both Data Encryption Standard
(DES) and Advanced Encryption Standard (AES) algorithms by means of
Python Cryptography Toolkit (Pycrypto). Security analysis such as key
space analysis and statistical analysis were carried out on the
encrypted image. The result of the analysis indicates that AES algorithm
is secure and robust; hence the authentication and licensing of HDMI
can be improved by implementing HDCP design with AES algorithm.
KEYWORDS
Cite this paper
Iyare, R. and Walker, S. (2014) Improved High Definition Multimedia Interface Authentication Mechanism. Journal of Computer and Communications, 2, 18-25. doi: 10.4236/jcc.2014.212003.
[1] |
Bright, P. (2012) Claimed HDCP
Master Key Leak Could Be Fatal to DRM Scheme. Cited: 16 July 2012,
Online. http://arstechnica.com/tech-policy/2010/09/claimed-hdcp-master-key-leak-could-be-fatal-to-drm-scheme/ |
[2] |
HDCP Technologies-Digital Content Protection, LLC. (2012) Cited: 28 July 2012, Online. http://www.digital-cp.com/hdcp_technologies |
[3] | Westerkamp, D. (2007) HDMI and HDCP—The Manufacturer’s Perspective. EICTA Article. |
[4] |
Evain, J. (2012) HDCP—The FTA Broadcasters’ Perspective. Cited: 25 July 2012, Online. http://www.ebu.ch/fr/technical/trev/trev_312-eviain_hdcp.pdf |
[5] | Johnson, R., Rubnich, M. and DelaCruz, A. (2011) Implementing a Key Recovery Attack on the High-Bandwidth Digital Content Protection Protocol. Proceedings of Consumer Communications and Networking Conference (CCNC) IEEE 2011, Las Vegas, 9-12 January 2011. |
[6] |
Roettgers, J. (2012) Scientists
Release HDCP Decryption Tool. Cited: 24 July 2012, Online. http://gigaom.com/video/scientists-release-hdcp-decryption-tool/ |
[7] | Crosby, S., et al. (2012) A Cryptanalysis of High Bandwidth Digital Content Protection System. Proceedings of the 2002 ACM Digital Rights Management Workshop, Alexandria, October 30-November 3, 2006, 192-200. |
[8] | HDCP Deciphered: Digital Content Protection LLC. White Paper, 2008. |
[9] | Candelore, B. and Diego, S. (2009) Wireless Video Communication. United States Patents: US2009/0103471 A1. April 23. |
[10] | Zhao, J.J., et al. (2011) On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair. Elsevier Journal, 19-25. |
[11] | LLC Digital Content Protection (2008) High Bandwidth Digital Content Protection System: Interface Independent Adaptation. |
[12] | Stockfisch, M. (2007) HDMI/DVI HDCP Handshake Problems and How to Avoid Them. Quantum Data Inc. White Paper. |
[13] | Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms and Source Code. |
[14] | Bourbakis, N. and Dollas, A. (2003) Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Magazine, 10, 79-87. http://dx.doi.org/10.1109/MMUL.2003.1218259 |
[15] | Shiguo, L., Jinsheny, S. and Zhiquan, W. (2005) A Block Cipher Based for the Chaotic Standard Map. Chaos, Solutions and Fractals, 26, 117-129. |
[16] | Li, S.J., Zheng, X., Mou, X.Q. and Cai, Y.L. (2002) Chaotic Encryption Scheme for Real Time Digital Video. Proceedings of SPIE, 4666, 149-160. |
[17] |
Rouse, M. (2012) What Is Initialization Vector (IV)? http://whatis.techtarget.com/definition/initialization-vector-IV |
[18] | Gaj, K. and Chodowiec, P. (2001) Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA CT-RSA 2001, San Francisco, 8-12 April 2001, 84-99. |
[19] | Hodjat, A. and Verbauwhede, I. (2004) A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. Processing of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Napa, 20-23 April 2004, 308-309. |
[20] | Janvinen, K., Tominisko, M. and Skytta, J. (2003) A Fully Pipelined Memoryless 17, 8 Gpbs AES-128 Encryptor. Proceedings of the International Symposium on Field Programmable Gate Arrays, Monterey, 23-25 February 2003, 207-215. |
[21] |
Mclone, M. and McCanny, J.
(2003) Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal
of VLSI Signal Processing Systems for Signal, Image and Video
Technology, 34, 261-275. http://dx.doi.org/10.1023/A:1023252403567 |
[22] | Shannon, C.E. (1949) Communication Theory of Secrecy System. Bell System Technical Journal, 28, 656-715. |
[23] |
Zeghid, M., Machhout, M.,
Khriji, L., Baganne, A. and Tourki, R. (2007) A Modified AES Based
Algorithm for Image Encryption. World Academy of Science, Engineering
and Technology, 1, 10. http://www.waset.org/journals/waset/v3/v3-86.pdf |
[24] |
Wildlife Refuge by Golacula 153 Views-Wildlife.avi. August 2011. http://www.youtube.com/watch?v=ft9XGMd8I4c eww141024lx |
评论
发表评论