Improved High Definition Multimedia Interface Authentication Mechanism

Abstract

Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital Multimedia Interface (HDMI). In this paper, we have been able to show how cryptanalysts have conducted attacks on the HDCP protocol showing its vulnerability in protecting digital contents. Therefore, the HDCP scheme is seriously flawed and compromised. Encryption and decryption of audio/video files were implemented in both Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms by means of Python Cryptography Toolkit (Pycrypto). Security analysis such as key space analysis and statistical analysis were carried out on the encrypted image. The result of the analysis indicates that AES algorithm is secure and robust; hence the authentication and licensing of HDMI can be improved by implementing HDCP design with AES algorithm.

Share and Cite:

Iyare, R. and Walker, S. (2014) Improved High Definition Multimedia Interface Authentication Mechanism. Journal of Computer and Communications, 2, 18-25. doi: 10.4236/jcc.2014.212003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Bright, P. (2012) Claimed HDCP Master Key Leak Could Be Fatal to DRM Scheme. Cited: 16 July 2012, Online.
http://arstechnica.com/tech-policy/2010/09/claimed-hdcp-master-key-leak-could-be-fatal-to-drm-scheme/
[2] HDCP Technologies-Digital Content Protection, LLC. (2012) Cited: 28 July 2012, Online.
http://www.digital-cp.com/hdcp_technologies
[3] Westerkamp, D. (2007) HDMI and HDCP—The Manufacturer’s Perspective. EICTA Article.
[4] Evain, J. (2012) HDCP—The FTA Broadcasters’ Perspective. Cited: 25 July 2012, Online.
http://www.ebu.ch/fr/technical/trev/trev_312-eviain_hdcp.pdf
[5] Johnson, R., Rubnich, M. and DelaCruz, A. (2011) Implementing a Key Recovery Attack on the High-Bandwidth Digital Content Protection Protocol. Proceedings of Consumer Communications and Networking Conference (CCNC) IEEE 2011, Las Vegas, 9-12 January 2011.
[6] Roettgers, J. (2012) Scientists Release HDCP Decryption Tool. Cited: 24 July 2012, Online.
http://gigaom.com/video/scientists-release-hdcp-decryption-tool/
[7] Crosby, S., et al. (2012) A Cryptanalysis of High Bandwidth Digital Content Protection System. Proceedings of the 2002 ACM Digital Rights Management Workshop, Alexandria, October 30-November 3, 2006, 192-200.
[8] HDCP Deciphered: Digital Content Protection LLC. White Paper, 2008.
[9] Candelore, B. and Diego, S. (2009) Wireless Video Communication. United States Patents: US2009/0103471 A1. April 23.
[10] Zhao, J.J., et al. (2011) On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair. Elsevier Journal, 19-25.
[11] LLC Digital Content Protection (2008) High Bandwidth Digital Content Protection System: Interface Independent Adaptation.
[12] Stockfisch, M. (2007) HDMI/DVI HDCP Handshake Problems and How to Avoid Them. Quantum Data Inc. White Paper.
[13] Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms and Source Code.
[14] Bourbakis, N. and Dollas, A. (2003) Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Magazine, 10, 79-87. http://dx.doi.org/10.1109/MMUL.2003.1218259
[15] Shiguo, L., Jinsheny, S. and Zhiquan, W. (2005) A Block Cipher Based for the Chaotic Standard Map. Chaos, Solutions and Fractals, 26, 117-129.
[16] Li, S.J., Zheng, X., Mou, X.Q. and Cai, Y.L. (2002) Chaotic Encryption Scheme for Real Time Digital Video. Proceedings of SPIE, 4666, 149-160.
[17] Rouse, M. (2012) What Is Initialization Vector (IV)?
http://whatis.techtarget.com/definition/initialization-vector-IV
[18] Gaj, K. and Chodowiec, P. (2001) Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer’s Track at RSA CT-RSA 2001, San Francisco, 8-12 April 2001, 84-99.
[19] Hodjat, A. and Verbauwhede, I. (2004) A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. Processing of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Napa, 20-23 April 2004, 308-309.
[20] Janvinen, K., Tominisko, M. and Skytta, J. (2003) A Fully Pipelined Memoryless 17, 8 Gpbs AES-128 Encryptor. Proceedings of the International Symposium on Field Programmable Gate Arrays, Monterey, 23-25 February 2003, 207-215.
[21] Mclone, M. and McCanny, J. (2003) Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, 34, 261-275.
http://dx.doi.org/10.1023/A:1023252403567
[22] Shannon, C.E. (1949) Communication Theory of Secrecy System. Bell System Technical Journal, 28, 656-715.
[23] Zeghid, M., Machhout, M., Khriji, L., Baganne, A. and Tourki, R. (2007) A Modified AES Based Algorithm for Image Encryption. World Academy of Science, Engineering and Technology, 1, 10.
http://www.waset.org/journals/waset/v3/v3-86.pdf
[24] Wildlife Refuge by Golacula 153 Views-Wildlife.avi. August 2011.
http://www.youtube.com/watch?v=ft9XGMd8I4c

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.