Content deleted Content added
m HTTP→HTTPS for Ars Technica, per BRFA 8 using AWB |
VulcanSphere (talk | contribs) Rescuing 10 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(47 intermediate revisions by 29 users not shown) | |||
Line 1:
{{short description|Standard for content distribution and digital rights management}}
{{Update|date=August 2017}}
{{Use dmy dates|date=February 2020}}
[[Image:AACS dataflow.svg|right|thumb|AACS decryption process]]
The '''Advanced Access Content System''' ('''AACS''') is a [[standardization|standard]] for [[content distribution]] and [[digital rights management]], intended to restrict access to and copying of the post-[[DVD]] generation of optical discs. The specification was publicly released in April 2005.
Since appearing in devices in 2006, several AACS decryption keys have been extracted from software players and published on the Internet, allowing decryption by unlicensed software.
Line 8 ⟶ 10:
==System overview==
===Encryption===
AACS uses [[cryptography]] to control and restrict the use of digital media. It encrypts content under one or more ''title keys'' using the [[Advanced Encryption Standard]] (AES). Title keys are decrypted using
The principal difference between AACS and [[Content Scramble System|CSS]]
Under CSS, all players of a given model group are provisioned with the same shared activated decryption key. Content is encrypted
In principle, this approach allows licensors to "revoke" a given player model (prevent it from playing back future content) by omitting to encrypt future title keys with the player model's key. In practice, however, revoking all players of a particular model is costly, as it causes many users to lose playback capability. Furthermore, the inclusion of a shared key across many players makes key compromise significantly more likely, as was demonstrated by a number of compromises in the mid-1990s.
The approach of AACS provisions each individual player with a unique set of decryption keys which are used in a [[broadcast encryption]] scheme. This approach allows licensors to "revoke" individual players, or more specifically, the decryption keys associated with the player. Thus, if a given player's keys are compromised and published, the AACS LA can simply revoke those keys in future content,
AACS also incorporates [[traitor tracing]] techniques. The standard allows for multiple versions of short sections of a movie to be encrypted with different keys, while a given player will only be able to decrypt one version of each section. The manufacturer embeds varying [[Digital watermarking|digital watermarks]] (such as [[Cinavia]]) in these sections, and upon subsequent analysis of the pirated release the compromised keys can be identified and revoked (this feature is called ''Sequence keys'' in the AACS specifications).<ref>{{cite web |author=Hongxia Jin |author2=Jeffery Lotspiech |author3-link=Nimrod Megiddo |author3=Nimrod Megiddo |title=Efficient Traitor Tracing |date=4 October 2006 |url=http://domino.watson.ibm.com/library/cyberdig.nsf/papers/AF8C220CB33D5A98852571FF00570458/$File/rj10390.pdf |access-date=2 May 2007 |archive-date=5 February 2012 |archive-url=https://web.archive.org/web/20120205202528/http://domino.watson.ibm.com/library/cyberdig.nsf/papers/AF8C220CB33D5A98852571FF00570458/$File/rj10390.pdf |url-status=live }}</ref><ref>{{cite web
|title = AACS Reference: Pre-recorded Video Book
|url = http://www.aacsla.com/specifications/specs091/AACS_Spec_Prerecorded_0.91.pdf
|access-date =
|archive-url = https://web.archive.org/web/20120206054929/http://www.aacsla.com/specifications/specs091/AACS_Spec_Prerecorded_0.91.pdf
|archive-date = 6 February 2012
|url-status = dead
|df = dmy-all
}}</ref>
=== Volume IDs ===
Volume IDs are unique identifiers or [[serial
To read the Volume ID, a cryptographic [[Public key certificate|certificate]] (the ''Private Host Key'') signed by the AACS LA is required. However, this has been circumvented by modifying the firmware of some HD DVD and Blu-ray drives.<ref name=arstechnica-aacs>{{cite web
|url
|title
|
|first
|last
|date=15 April 2007
|work=Ars Technica
|archive-url=https://web.archive.org/web/20070504171556/http://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html
|archive-date=4 May 2007
|url-status=live
}}</ref><ref>{{cite web
|url = http://forum.doom9.org/showthread.php?t=124294
|title = Got VolumeID without AACS authentication :)
|
|author = Geremia
|date=4 April 2007
|work=Doom9.net forums|
=== Decryption process ===
To view the movie, the player must first decrypt the content on the disc. The decryption process is somewhat convoluted. The disc contains 4 items—the Media Key Block (MKB), the Volume ID, the [[Encrypted Title Key|Encrypted Title Keys]], and the Encrypted Content. The MKB is encrypted in a subset difference tree approach. Essentially, a set of keys are arranged in a tree such that any given key can be used to find every other key except its parent keys. This way, to revoke a given [[Device Keys|device key]], the MKB needs only be encrypted with that device key's parent key.
Once the MKB is decrypted, it provides the Media Key, or the ''km''. The ''km'' is combined with the Volume ID (which the program can only get by presenting a cryptographic certificate to the drive, as described above) in a one-way encryption scheme (AES-G) to produce the Volume Unique Key (''Kvu''). The ''Kvu'' is used to decrypt the encrypted title keys, and that is used to decrypt the encrypted content.<ref name=arstechnica-aacs /><ref>{{cite web
|url = http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf
|title = Advanced Access Content System (AACS): Introduction and Common Cryptographic Elements
|
|date = 17 February 2007
|work = AACS Licensing Administrator
|archive-url = https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf
|archive-date = 2 March 2007
|url-status = dead
|df = dmy-all
}}</ref>
=== Analog Outputs ===
Line 61 ⟶ 71:
{{main|Image Constraint Token}}
AACS-compliant players must follow guidelines pertaining to outputs over analog connections. This is set by a flag called the Image Constraint Token (ICT), which restricts the resolution for analog outputs to 960×540. Full 1920×1080 resolution is restricted to HDMI or DVI outputs that support [[High-bandwidth Digital Content Protection|HDCP]]. The decision to set the flag to restrict output ("down-convert") is left to the content provider. Warner Pictures is a proponent of ICT, and it is expected that Paramount and Universal will implement down-conversion as well.<ref>{{cite web|url=http://www.videobusiness.com/article/CA6300812.html |title=High-def
AACS guidelines require that any title which implements the ICT must clearly state so on the packaging. The German magazine "Der Spiegel" has reported about an unofficial agreement between film studios and electronics manufacturers to not use ICT until 2010 – 2012.<ref>{{cite web |url=https://arstechnica.com/news.ars/post/20060521-6880.html |title=Hollywood reportedly in agreement to delay forced quality downgrades for Blu-ray, HD DVD |
=== Audio watermarking ===
On 5 June 2009, the licensing agreements for AACS were finalized, which were updated to make [[Cinavia]] [[audio watermark]] detection on commercial Blu-ray disc players a requirement.<ref>{{Cite press release | title = AACS Issues Final Agreements, Enabling Commercial Deployment of Cinavia in Blu-ray Disc Players | publisher = Verance | date = 5 June 2009 | url = http://www.verance.com/AdminSavR/news/news_item.php?news_id=42 |
===Managed Copy===
Line 72 ⟶ 82:
| url = http://www.hp.com/hpinfo/newsroom/press/2005/051216a.html
| title =HP to Support HD-DVD High-definition DVD Format and Join HD-DVD Promotions Group
|
|
Possible scenarios for Managed Copy include (but are not limited to):
Line 86 ⟶ 96:
| first = Melissa J.
| last = Perenson
| date = 21 March 2006
| work = PC World
| access-date = 5 May 2007
| archive-date = 9 October 2007
| archive-url = https://web.archive.org/web/20071009194043/http://www.pcworld.com/article/id,124961-page,1/article.html
| url-status = dead
}}</ref> It was expected to be a part of the final AACS specification.<ref>{{Cite web
|url= https://arstechnica.com/gadgets/news/2007/05/hd-dvd-blu-ray-managed-copy-coming-later-this-year.ars
|title=HD DVD, Blu-ray "Managed Copy" coming later this year
|work=arstechnica.com
|date=24 May 2007
|access-date=29 June 2010
| archive-url= https://web.archive.org/web/20100526040122/http://arstechnica.com/gadgets/news/2007/05/hd-dvd-blu-ray-managed-copy-coming-later-this-year.ars| archive-date= 26 May 2010 | url-status= live}}</ref>
In June 2009, the final AACS agreements were ratified and posted online, and include information on the Managed Copy aspects of AACS.
Line 99 ⟶ 114:
== History ==
On 24 February 2001, Dalit Naor, Moni Naor and Jeff Lotspiech published a paper entitled "Revocation and Tracing Schemes for Stateless Receivers", where they described a [[broadcast encryption]] scheme using a construct called Naor-Naor-Lotspiech subset-difference trees. That paper laid the theoretical foundations of AACS.<ref>{{cite web
The AACS LA consortium was founded in 2004.<ref>{{cite
|
|
|access-date
|
|date = January 2007
|work = Spectrum Online
|archive-url = https://web.archive.org/web/20070608074811/http://spectrum.ieee.org/jan05/2703
|archive-date = 8 June 2007
|url-status = dead
}}</ref> The final AACS standard was delayed,<ref>{{cite web|url=http://www.pcworld.com/article/id,123924-page,1/article.html |title=Toshiba Hints at HD-DVD Delay |access-date=19 October 2007 |author=Martyn Williams |date=14 December 2005 |work=pcworld.com |archive-url=https://web.archive.org/web/20071005171717/http://www.pcworld.com/article/id%2C123924-page%2C1/article.html |archive-date=5 October 2007 |url-status=live }}</ref> and then delayed again when an important member of the Blu-ray group voiced concerns.<ref>{{cite web |url=http://www.heise.de/english/newsticker/news/69559 |title=AACS copy protection for Blu-ray disc and HD DVD delayed again |access-date=19 October 2007 |author =Craig Morris |date=14 February 2006 |work=heise.de | archive-url= https://web.archive.org/web/20071102222432/http://www.heise.de/english/newsticker/news/69559| archive-date= 2 November 2007 | url-status= live}}</ref> At the request of Toshiba, an interim standard was published which did not include some features, like managed copy.<ref name=pcworld-burning-questions /> On July 5, 2009 the license of AACS1 went online.<ref>{{Cite web |last=Calonge |first=Juan |date=8 June 2009 |title=AACS Final License Goes Online |url=https://www.blu-ray.com/news/?id=2849 |access-date=11 March 2023 |website=blu-ray.com |archive-date=11 March 2023 |archive-url=https://web.archive.org/web/20230311133556/https://www.blu-ray.com/news/?id=2849 |url-status=live }}</ref>
==Unlicensed decryption==
On 26 December 2006, a person using the [[pseudonym|alias]] "muslix64" published a working, open-sourced AACS decrypting utility named [[BackupHDDVD]], looking at the publicly available AACS specifications. Given the correct keys, it can be used to decrypt AACS-encrypted content. A corresponding BackupBluRay program was soon developed.<ref>{{cite web
| url =
| first = Ben
| last = Drawbaugh
| title = BackupBluray available now too
|
|date=24 January 2007
| work = Engadget|
==Security==
Line 127 ⟶ 145:
| title = HD-DVD Content Protection already hacked?
| work = TechAmok
| date = 28 December 2006
| access-date = 2 January 2007
| archive-date = 10 September 2023
| archive-url = https://web.archive.org/web/20230910210905/http://www.techamok.com/?pid=1849
| url-status = live
}}</ref><ref>{{cite news
| url = http://news.bbc.co.uk/2/hi/technology/6301301.stm
| title = Hi-def DVD security is bypassed
|date=26 January 2007
|
|work=BBC
| last = Block
| first = Ryan
| url =
| title = Blu-ray cracked too?
|date=20 January 2007
| access-date = 22 January 2007
|work=Engadget |
| url = https://www.theregister.co.uk/2007/01/23/blu-ray_drm_cracked/
| first = John
| last = Leyden
Line 149 ⟶ 169:
| title = Blu-ray DRM defeated
|date=23 January 2007
|
Hackers also claim to have found Device Keys<ref>{{cite web
|url=http://forum.doom9.org/showthread.php?t=122664
|title=WinDVD 8 Device Key Found!
|
|author
|date=24 February 2007
|work=Doom9.net forums
|archive-date=21 June 2007
|archive-url=https://web.archive.org/web/20070621014631/http://forum.doom9.org/showthread.php?t=122664
|url-status=live
}}</ref>
(used to calculate the Processing Key) and a Host Private Key<ref>{{cite web
|url=http://forum.doom9.org/showthread.php?t=122969
|title=PowerDVD private key
|
|author =
|date=3 March 2007
|work=Doom9.net forums|
(a key signed by the AACS LA used for hand-shaking between host and HD drive; required for reading the Volume ID). The first unprotected HD movies were available soon afterwards.<ref>
{{cite web |url=http://www.dailytech.com/article.aspx?newsid=5747
|title=First Pirated HD DVDs Released
|
|first=Marcus
|last=Yam
|date=17 January 2007
|work=DailyTech
|archive-url=https://web.archive.org/web/20070219103102/http://www.dailytech.com/article.aspx?newsid=5747
|archive-date=19 February 2007
|url-status=dead
}}
</ref>
The [[AACS encryption key controversy|processing key was widely published]] on the Internet after it was found and the AACS LA sent multiple [[DMCA takedown notice]]s in the aim of censoring it.<ref>{{cite web
|url=http://www.chillingeffects.org/notice.cgi?sID=3218
|title=AACS licensor complains of posted key
|access-date=2 May 2007
|archive-date=1 May 2007
|archive-url=https://web.archive.org/web/20070501142633/http://www.chillingeffects.org/notice.cgi?sID=3218
|url-status=live
}}</ref>
Some sites that rely on user-submitted content, like [[Digg]] and Wikipedia, tried to remove any mentions of the key.<ref>{{cite magazine
|url=http://blog.wired.com/business/2007/05/wikipedia_locks.html
|title=Wikipedia Locks Out "The Number"
|last=Boutin
|
|date=1 May 2007
|
|title=Digg's DRM Revolt
|first=Andy
Line 190 ⟶ 222:
|date=2 May 2007
|work=Forbes
|url=
|
The Digg administrators eventually gave up trying to censor submissions that contained the key.<ref>{{cite news
|url=http://news.bbc.co.uk/2/hi/technology/6615047.stm
|title=DVD DRM row sparks user rebellion
|
|date=2 May 2007
|work=BBC
The AACS key extractions highlight the inherent weakness in any DRM system that permit software players for PCs to be used for playback of content. No matter how many layers of encryption are employed, it does not offer any true protection, since the keys needed to obtain the unencrypted content stream must be available somewhere in memory for playback to be possible. The PC platform offers no way to prevent memory snooping attacks on such keys, since a PC configuration can always be emulated by a [[virtual machine]], in theory without any running program or external system being able to detect the virtualization. The only way to wholly prevent attacks like this would require changes to the PC platform (see [[Trusted Computing]]) which could provide protection against such attacks. This would require that content distributors do not permit their content to be played on PCs without trusted computing technology, by not providing the companies making software players for non-trusted PCs with the needed encryption keys.
On 16 April 2007, the AACS consortium announced that it had expired certain encryption keys used by PC-based applications. Patches were available for [[WinDVD]] and [[PowerDVD]] which used new and uncompromised encryption keys.<ref>
{{cite web| url= http://www.aacsla.com/press/| title= Press Messages: AACS – Advanced Access Content System| access-date= 2 May 2007| archive-url= https://web.archive.org/web/20070430070403/http://www.aacsla.com/press/| archive-date= 30 April 2007| url-status= dead| df= dmy-all}}
</ref><ref>
{{cite web
|url=http://dailytech.com/AACS+Responds+to+Cracked+HD+DVD+and+Bluray+Disc+Protections/article5879.htm
|title=AACS Responds to Cracked HD DVD and Blu-ray Disc Protections
|
|first=Marcus
|last=Yam
|date=26 January 2007
|work=DailyTech
|archive-url=https://web.archive.org/web/20070211005800/http://dailytech.com/AACS+Responds+to+Cracked+HD+DVD+and+Bluray+Disc+Protections/article5879.htm
|archive-date=11 February 2007
|url-status=dead
}}
</ref>
The old, compromised keys can still be used to decrypt old titles, but not newer releases as they will be encrypted with these new keys. All users of the affected players (even those considered "legitimate" by the AACS LA) are forced to upgrade or replace their player software in order to view new titles.
Line 221 ⟶ 257:
|url=http://www.newsfactor.com/news/Blu-ray--HD-DVD-Encryption-Cracked/story.xhtml?story_id=121000E3UUOA
|title=Blu-ray and HD DVD Encryption Cracked
|access-date=29 May 2007
|author
|date=26 January 2007
|work=NewsFactor Network
|archive-url=https://web.archive.org/web/20071103050531/http://www.newsfactor.com/news/Blu-ray--HD-DVD-Encryption-Cracked/story.xhtml?story_id=121000E3UUOA
|archive-date=3 November 2007
|url-status=dead
}}
</ref>
The AACS LA has sent [[DMCA takedown notice]]s to such sites on at least one occasion.<ref>{{cite web
|url=http://forum.doom9.org/attachment.php?attachmentid=7071&d=1176327932
|title=Illegal Offering of Title/Volume Keys to Circumvent AACS Copyright Protection: hdkeys.com
|format=pdf
|access-date=29 May 2007
|author
|date=5 April 2007
|work=DMCA takedown notice
|archive-date=26 September 2007
|archive-url=https://web.archive.org/web/20070926213835/http://forum.doom9.org/attachment.php?attachmentid=7071&d=1176327932
|url-status=live
}}</ref>
There is also commercial software ([[AnyDVD|AnyDVD HD]]) that can circumvent the AACS protection. Apparently this program works even with movies released after the AACS LA expired the first batch of keys.<ref>
Line 240 ⟶ 282:
|url=https://arstechnica.com/news.ars/post/20070517-latest-aacs-revision-defeated-a-week-before-release.html
|title=Latest AACS revision defeated a week before release
|access-date=29 May 2007
|author =Ryan Paul
|date=7 May 2007
|work=Ars Technica
|
</ref>
Line 251 ⟶ 293:
| title = Work Around for New DVD Format Protections
|date=7 June 2006
|
| work = [[Slashdot]]}}</ref><ref>{{cite web
| url = http://www.heise-online.co.uk/security/Copy-protection-hole-in-Blu-ray-and-HD-DVD-movies--/news/75103
| archive-url = https://web.archive.org/web/20080222160135/http://www.heise-online.co.uk/security/Copy-protection-hole-in-Blu-ray-and-HD-DVD-movies--/news/75103
| title = Copy protection hole in Blu-ray and HD DVD movies
|
| archive-date = 22 February 2008
|date=7 July 2006
| author = Edward Henning
| work = heise Security}}</ref>
==Patent challenges==
{{main|ECC patents}}
On 30 May 2007, Canadian encryption vendor [[Certicom]] sued Sony alleging that AACS violated two of its patents, "Strengthened public key protocol"<ref>
{{cite web
|url=
|title=Strengthened public key protocol
|access-date=31 May 2007
|author =Scott A. Vanstone
|date=1 April 1999
|work=US Patent Office
|display-authors=etal}}
</ref> and "Digital signatures on a Smartcard."<ref>{{cite web
|url=https://patents.google.com/patent/US6704870
|title=Digital signatures on a Smartcard
|access-date=31 May 2007
|author
|date=29 August 2001
|work=US Patent Office
|display-authors=etal
|archive-date=27 March 2019
|archive-url=https://web.archive.org/web/20190327011204/https://patents.google.com/patent/US6704870
|url-status=live
}}</ref> The patents were filed in 1999 and 2001 respectively, and in 2003 the [[National Security Agency]] paid $25 million for the right to use 26 of Certicom's patents, including the two that Sony is alleged to have infringed on.<ref>
{{cite web
|url=https://arstechnica.com/news.ars/post/20070531-encryption-vendor-claims-aacs-infringes-its-patents-sues-sony.html
|title=Encryption vendor claims AACS infringes its patents, sues Sony
|access-date=31 May 2007
|author =Nate Anderson
|date=31 May 2007
|work=Ars Technica
|
</ref>
The lawsuit was dismissed on May 27, 2009.<ref>{{cite web
| url=http://dockets.justia.com/docket/texas/txedce/2:2007cv00216/103383/
| title=Certicom Corporation et al v. Sony Corporation et al Featured Case Has Decisions
| date=2009-05-27
| publisher=justia.com
| access-date=2013-08-12
| archive-date=18 September 2020
| archive-url=https://web.archive.org/web/20200918180848/https://dockets.justia.com/docket/texas/txedce/2:2007cv00216/103383
| url-status=live
}}</ref>
==See also==
* [[Security of Advanced Access Content System|History of attacks against Advanced Access Content System]]
* [[AACS encryption key controversy]]
==References==
{{reflist
==External links==
{{wikinews|High definition anti-piracy DRM possibly hacked}}
* [https://web.archive.org/web/20100306013059/http://www.aacsla.com/home Old AACS homepage]
* [
* [https://web.archive.org/web/20070128110342/http://www.aacsla.com/specifications/ AACS specifications]
* [http://forum.doom9.org/showthread.php?t=122363 Understanding AACS], an introductory forum thread. {{Webarchive|url=https://web.archive.org/web/20120205101739/http://forum.doom9.org/showthread.php?t=122363|date=dmy}} with the diagrams working.
* [http://www.isan.org ISAN homepage], ISAN as required in the Content ID defined in AACS [https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf Introduction and Common Cryptographic Elements rev 0.91]
* [http://www.videolan.org/developers/libaacs.html libaacs], an open source library implementing AACS
* [http://www.metzdowd.com/pipermail/cryptography/2007-May/012313.html Hal Finney on 'AACS and Processing Key'], [[Hal Finney (cypherpunk)|Hal Finney]]'s post on metzdowd.com cryptography mailing list
Line 311 ⟶ 368:
{{HD DVD}}
[[Category:Advanced Access Content System| ]]
[[Category:Digital rights management standards]]
[[Category:Compact Disc and DVD copy protection]]
[[Category:Blu-ray Disc]]
|