跳至主要内容

Improved High Definition Multimedia Interface Authentication Mechanism

Read full paper at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=50705#.VEmeuVfHRK0

Author(s)
Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital Multimedia Interface (HDMI). In this paper, we have been able to show how cryptanalysts have conducted attacks on the HDCP protocol showing its vulnerability in protecting digital contents. Therefore, the HDCP scheme is seriously flawed and compromised. Encryption and decryption of audio/video files were implemented in both Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms by means of Python Cryptography Toolkit (Pycrypto). Security analysis such as key space analysis and statistical analysis were carried out on the encrypted image. The result of the analysis indicates that AES algorithm is secure and robust; hence the authentication and licensing of HDMI can be improved by implementing HDCP design with AES algorithm.
Cite this paper
Iyare, R. and Walker, S. (2014) Improved High Definition Multimedia Interface Authentication Mechanism. Journal of Computer and Communications, 2, 18-25. doi: 10.4236/jcc.2014.212003
 

[1] Bright, P. (2012) Claimed HDCP Master Key Leak Could Be Fatal to DRM Scheme. Cited: 16 July 2012, Online.
http://arstechnica.com/tech-policy/2010/09/claimed-hdcp-master-key-leak-could-be-fatal-to-drm-scheme/
[2] HDCP Technologies-Digital Content Protection, LLC. (2012) Cited: 28 July 2012, Online.
http://www.digital-cp.com/hdcp_technologies
[3] Westerkamp, D. (2007) HDMI and HDCP—The Manufacturer’s Perspective. EICTA Article.
[4] Evain, J. (2012) HDCP—The FTA Broadcasters’ Perspective. Cited: 25 July 2012, Online.
http://www.ebu.ch/fr/technical/trev/trev_312-eviain_hdcp.pdf
[5] Johnson, R., Rubnich, M. and DelaCruz, A. (2011) Implementing a Key Recovery Attack on the High-Bandwidth Digital Content Protection Protocol. Proceedings of Consumer Communications and Networking Conference (CCNC) IEEE 2011, Las Vegas, 9-12 January 2011.
[6] Roettgers, J. (2012) Scientists Release HDCP Decryption Tool. Cited: 24 July 2012, Online.
http://gigaom.com/video/scientists-release-hdcp-decryption-tool/
[7] Crosby, S., et al. (2012) A Cryptanalysis of High Bandwidth Digital Content Protection System. Proceedings of the 2002 ACM Digital Rights Management Workshop, Alexandria, October 30-November 3, 2006, 192-200.
[8] HDCP Deciphered: Digital Content Protection LLC. White Paper, 2008.
[9] Candelore, B. and Diego, S. (2009) Wireless Video Communication. United States Patents: US2009/0103471 A1. April 23.
[10] Zhao, J.J., et al. (2011) On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair. Elsevier Journal, 19-25.
[11] LLC Digital Content Protection (2008) High Bandwidth Digital Content Protection System: Interface Independent Adaptation.
[12] Stockfisch, M. (2007) HDMI/DVI HDCP Handshake Problems and How to Avoid Them. Quantum Data Inc. White Paper.
[13] Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms and Source Code.
[14] Bourbakis, N. and Dollas, A. (2003) Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Magazine, 10, 79-87. http://dx.doi.org/10.1109/MMUL.2003.1218259
[15] Shiguo, L., Jinsheny, S. and Zhiquan, W. (2005) A Block Cipher Based for the Chaotic Standard Map. Chaos, Solutions and Fractals, 26, 117-129.
[16] Li, S.J., Zheng, X., Mou, X.Q. and Cai, Y.L. (2002) Chaotic Encryption Scheme for Real Time Digital Video. Proceedings of SPIE, 4666, 149-160.
[17] Rouse, M. (2012) What Is Initialization Vector (IV)?
http://whatis.techtarget.com/definition/initialization-vector-IV
[18] Gaj, K. and Chodowiec, P. (2001) Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA CT-RSA 2001, San Francisco, 8-12 April 2001, 84-99.
[19] Hodjat, A. and Verbauwhede, I. (2004) A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. Processing of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Napa, 20-23 April 2004, 308-309.
[20] Janvinen, K., Tominisko, M. and Skytta, J. (2003) A Fully Pipelined Memoryless 17, 8 Gpbs AES-128 Encryptor. Proceedings of the International Symposium on Field Programmable Gate Arrays, Monterey, 23-25 February 2003, 207-215.
[21] Mclone, M. and McCanny, J. (2003) Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, 34, 261-275.
http://dx.doi.org/10.1023/A:1023252403567
[22] Shannon, C.E. (1949) Communication Theory of Secrecy System. Bell System Technical Journal, 28, 656-715.
[23] Zeghid, M., Machhout, M., Khriji, L., Baganne, A. and Tourki, R. (2007) A Modified AES Based Algorithm for Image Encryption. World Academy of Science, Engineering and Technology, 1, 10.
http://www.waset.org/journals/waset/v3/v3-86.pdf
[24] Wildlife Refuge by Golacula 153 Views-Wildlife.avi. August 2011.
http://www.youtube.com/watch?v=ft9XGMd8I4c            eww141024lx

评论

此博客中的热门博文

A Comparison of Methods Used to Determine the Oleic/Linoleic Acid Ratio in Cultivated Peanut (Arachis hypogaea L.)

Cultivated peanut ( Arachis hypogaea L.) is an important oil and food crop. It is also a cheap source of protein, a good source of essential vitamins and minerals, and a component of many food products. The fatty acid composition of peanuts has become increasingly important with the realization that oleic acid content significantly affects the development of rancidity. And oil content of peanuts significantly affects flavor and shelf-life. Early generation screening of breeding lines for high oleic acid content greatly increases the efficiency of developing new peanut varieties. The objective of this study was to compare the accuracy of methods used to classify individual peanut seed as high oleic or not high oleic. Three hundred and seventy-four (374) seeds, spanning twenty-three (23) genotypes varying in oil composition (i.e. high oleic (H) or normal/not high oleic (NH) inclusive of all four peanut market-types (runner, Spanish, Valencia and Virginia), were individually tested ...

Location Optimization of a Coal Power Plant to Balance Costs against Plant’s Emission Exposure

Fuel and its delivery cost comprise the biggest expense in coal power plant operations. Delivery of electricity from generation to consumers requires investment in power lines and transmission grids. Placing a coal power plant or multiple power plants near dense population centers can lower transmission costs. If a coalmine is nearby, transportation costs can also be reduced. However, emissions from coal plants play a key role in worsening health crises in many countries. And coal upon combustion produces CO 2 , SO 2 , NO x , CO, Metallic and Particle Matter (PM10 & PM2.5). The presence of these chemical compounds in the atmosphere in close vicinity to humans, livestock, and agriculture carries detrimental health consequences. The goal of the research was to develop a methodology to minimize the public’s exposure to harmful emissions from coal power plants while maintaining minimal operational costs related to electric distribution losses and coal logistics. The objective was...

Evaluation of the Safety and Efficacy of Continuous Use of a Home-Use High-Frequency Facial Treatment Appliance

At present, many home-use beauty devices are available in the market. In particular, many products developed for facial treatment use light, e.g., a flash lamp or a light-emitting diode (LED). In this study, the safety of 4 weeks’ continuous use of NEWA TM , a high-frequency facial treatment appliance, every alternate day at home was verified, and its efficacy was evaluated in Japanese individuals with healthy skin aged 30 years or older who complained of sagging of the facial skin.  Transepidermal water loss (TEWL), melanin levels, erythema levels, sebum secretion levels, skin color changes and wrinkle improvement in the facial skin were measured before the appliance began to be used (study baseline), at 2 and 4 weeks after it had begun to be used, and at 2 weeks after completion of the 4-week treatment period (6 weeks from the study baseline). In addition, data obtained by subjective evaluation by the subjects themselves on a visual analog scale (VAS) were also analyzed. Fur...