Detta är ett uppsatsförslag hämtat från Nationella Exjobb-poolen. Klicka här för att komma tillbaka till samtliga exjobbsförslag.
Protection of digital content using tamper-resistant hardware
This project is about implementing a prototype system that uses a tamper-resistant hardware component to protect an electronic book from unauthorized access and use.
Short Introduction to DRM
Digital Rights Management (DRM) is the technology that provides mechanisms to protect the digital goods, such as software products, electronic books, and audio/video content from unauthorized distribution and use.
The key components of a DRM system that reside at the user side are the Digital Goods (DG), the associated license that specifies the access and usage rights (Lic), the Rendering Application (RA) and the DRM Controller (DRMC). When the end user tries to render the DG (read the book, listen to a song, etc.) the DRMC checks the available rights in the Lic. If appropriate rights exist the DRMC decrypts the DG using the key stored in the Lic and passes the decrypted DG to the RA. The DRMC is a key component that mediates the access of the end user to the DG. The DRMC is subject to attacks in order to circumvent the protection of the DRM system.
To secure the services provided by the DRMC one solution is to place these services in a trusted and tamper-resistant environment. Such an environment can be provided by existing hardware tokens (smart cards, USB keys), specialized chips (www.tcg.com), or even secure coprocessor boards (http://www-3.ibm.com/security/ cryptocards/index.shtml).
This project is about defining and implementing a set of services to be used by a DRM system, using the security primitives (functions) provided by a tamper-resistant hardware component.
The goal of this project is to define and implement a set of services that will be performed by the DRM Controller with the help of a tamper-resistant hardware component ¿ a USB key with a processing capability and a set of basic security functions (encryption, decryption, key generation, hashing and signing, etc.). The results of this project will be integrated with other components of the DRM system, such as the rendering application, the digital goods package and the associated license.
Links to additional information
The tamper-resistant USB key used in the project - http://wibu.com/us/cm.php
Additional details about the architecture of the DRM system can be provided upon request.
- Security and basic Cryptography ¿ symmetric vs. asymmetric encryption; mechanisms to address confidentiality and integrity of data; use of certificates for authentication and identification;
- C ¿ the tamper-resistant token that is used in the project has an API written in C;
- Java ¿ the Java Native Interface (JNI) will be used to bridge the results of this project with the rest of the system, which is written in Java.
Eduard Turcan ([email protected]) - PhD student, Laboratory for Intelligent Information Systems (IISLAB), ADIT division, IDA.
Professor Nahid Shahmehri ([email protected]) - IISLAB, ADIT division, IDA.
Informationen om uppsatsförslag är hämtad från Nationella Exjobb-poolen.