DeSDMI

Menu
Home
Who are we?
What is SDMI?
FAQ
Forum
Related links
Disclaimer
Contact us

In depth
 • SDMI system overview
 • Attack methods
 • Technical report

 


Francais


English

Introduction
Let us briefly explain how the SDMI works (as far as we've understood, at least). The goal of the SDMI is very specific and has often been misunderstood. The scenario is the following: there will be SDMI compliant devices. These may be of different kinds (HiFi, portable players, car players, etc). In order to play a song on such a device, it needs to pass the gate of the secure world. The two main requirements are the following:
  • All legacy LPs must pass this gate.
  • All new LPs that have been legally bought must also pass this gate.
The goal of the SDMI is to prevent the following: Bob buys an LP, rips the tracks to his computer, compress them, sends them to Alice. Alice burns them on an LP and imports them in the secure world. What the SDMI algorithm does not prevent (although it's illegal) is the following: Bob buys an LP, burns a copy, gives the copy to Alice. Alice imports the songs in the secure world. Consequently, if Bob transmit an ISO image of the LP over the net to Alice, she should be able to burn it and import it in the secure world. However, an ISO is VERY big, and this procedure is time consuming and may be costly. To put it another way, it should be impossible to import an LP into the secure world if it has been modified in any way (notably if it has been compressed). Checking for the integrity of a document can be done using standard cryptographic techniques, such as MAC, or even signatures. Therefore, one can wonder at first why watermarking is needed? The problem is that legacy LPs do not include any kind of verification information but should not be rejected. Consequently, it is necessary to be able to distinguish legacy and new LPs. This is where watermarking technologies will be used.

The gatekeeper
Now, how is the gate checked?

There are in fact two algorithms:

  • A watermarking technology
  • An identification technology
When an LP is created, the songs on the LP are watermarked using the watermarking technology. Then, the LP is "signed" using the identification technology. The watermarking technology is simply here to enable the gatekeeper to make the difference between legacy content and new content. If a mark can be found, the content is deemed new. The identification technology is here to prevent modifications of the LP, notably compression. When an LP is trying to enter the secure world, the following checks are made:
  • Is it marked?
  • Is there a signature and is it valid?
So, we have several cases:
MarkedNon Marked
Signed and unvalidRejectReject???
UnsignedRejectAccept
Signed and validAcceptAccept???

The results of the first column are very clear. If the mark is found, the LP is new, therefore it should be correctly signed. If is it not, it should be rejected.
The second column is not as clear. If it is unmarked and unsigned, this is supposed to be a legacy LP so accept it. If it is unmarked BUT signed, it means something strange happened. We are not too sure how the test behaves in these cases.

Now, how to attack?
There are two ways to attack the system.

The first one is to break the identification technology, so as to be able to recreate valid signatures from any marked content. This is very unlikely to succeed, because digital signatures are safe unless a design error is made.

The second attempt is to remove the marks so that the detector believes that the LP is a legacy one. (Destroying the signature, which is very different from recreating one, is trivial).


Home | FAQ | Forum | Disclaimer | Contact us
Copyright © 2001 Julien Stern