DocumentCode
2942770
Title
Analysis on AACS´ Traitor Tracing Against Mix-and-Match Attacks
Author
Bin Zhu ; Min Feng ; Fen Liu ; Lei Hu
Author_Institution
Microsoft Res. Asia, Beijing
fYear
2008
fDate
10-12 Jan. 2008
Firstpage
1097
Lastpage
1101
Abstract
In this position paper, we report the progress of our project to analyze security of the traitor tracing technology used in Advanced Access Content System (AACS). For a simplified problem that all sequence keys are statically assigned according to known Reed Solomon (RS) codes, and a colluder is to be identified with the traitor tracing, we present a mix-and-match colluding attack to victimize an innocent device such that using the highest score of matches with AACS´ traitor tracing to identify a colluder will always indentify the victim as a colluder no matter how many movies are tested. Both theoretical analysis and experimental results show that a group of arbitrary 20 or more colluding devices out of a billion devices supported by AACS can always successfully victimize an innocent device. With 26 arbitrary colluders, an arbitrarily given device has a probability of 39.13% to be successfully victimized. Moreover, our attack enables everyone in a group as small as 6 arbitrary colluding devices to escape from being identified as a colluder with the traitor identification method. Analysis with more realistic assumptions will be reported in the future.
Keywords
Reed-Solomon codes; authorisation; cryptography; AACA traitor tracing security; Reed Solomon codes; advanced access content system; mix-and-match colluding attack; sequence keys; Asia; Broadcasting; Cryptography; DVD; Data security; Forensics; Motion pictures; Paper technology; Protection; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
Conference_Location
Las Vegas, NV
Print_ISBN
978-1-4244-1456-7
Electronic_ISBN
978-1-4244-1457-4
Type
conf
DOI
10.1109/ccnc08.2007.248
Filename
4446546
Link To Document