Skip to main content

A Critical Analysis and Improvement of AACS Drive-Host Authentication

  • Conference paper
Information Security and Privacy (ACISP 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5107))

Included in the following conference series:

  • 1039 Accesses

Abstract

This paper presents a critical analysis of the AACS drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications of the scheme are suggested in order to provide better security. A proof of security of the modified scheme is also presented. The modified scheme achieves better efficiency than the original scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 4C Entity LLC, Content Protection For Prerecorded Media Specification, Revision 1.0 (January 2003)

    Google Scholar 

  2. AACS LA, Advanced Access Content System (AACS) - Introduction and Common Cryptographic Elements, Revision 0.91, February 17 (2006), http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf

  3. Baek, J., Kim, K.: Remarks on the Unknown Key Share Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E83-A(12), 2766–2769 (2000)

    Google Scholar 

  4. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)

    Google Scholar 

  5. Blake-Wilson, S., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)

    Google Scholar 

  7. DVD Copy Control Association, CSS Procedural Specification, Version 2.9 (January 2007)

    Google Scholar 

  8. Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Designs, Codes and Cryptography 2(2), 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  9. Kaliski Jr., B.S.: An Unknown Key-Share Attack on the MQV Key Agreement Protocol. ACM Transactions on Information and System Security 4(3), 275–288 (2001)

    Article  Google Scholar 

  10. Krawczyk, H.: SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)

    Google Scholar 

  11. National Institute of Standards and Technology, Special Publication 800-56A, Recommendation for Pair-Wise Key Establish Schemes Using Discrete Logarithm Cryptography (March 2007)

    Google Scholar 

  12. Shim, K.: Unknown Key-Share Attack on Authenticated Multiple-Key Agreement Protocol. Electronics Letters 39(1), 38–39 (2003)

    Article  Google Scholar 

  13. Stinson, D.R.: Cryptography Theory and Practice, Third Edition, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006)

    Google Scholar 

  14. Zhou, H., Fan, L., Li, J.: Remarks on Unknown Key-Share Attack on Authenticated Multiple-Key Agreement Protocol. Electronics Letters 39(17), 1248–1249 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yi Mu Willy Susilo Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sui, J., Stinson, D.R. (2008). A Critical Analysis and Improvement of AACS Drive-Host Authentication. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy. ACISP 2008. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70500-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70500-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69971-2

  • Online ISBN: 978-3-540-70500-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics