Abstract
This paper presents a critical analysis of the AACS drive-host authentication scheme. A few weaknesses are identified which could lead to various attacks on the scheme. In particular, we observe that the scheme is susceptible to unknown key-share and man-in-the-middle attacks. Modifications of the scheme are suggested in order to provide better security. A proof of security of the modified scheme is also presented. The modified scheme achieves better efficiency than the original scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
4C Entity LLC, Content Protection For Prerecorded Media Specification, Revision 1.0 (January 2003)
AACS LA, Advanced Access Content System (AACS) - Introduction and Common Cryptographic Elements, Revision 0.91, February 17 (2006), http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf
Baek, J., Kim, K.: Remarks on the Unknown Key Share Attacks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E83-A(12), 2766–2769 (2000)
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)
Blake-Wilson, S., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)
Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)
DVD Copy Control Association, CSS Procedural Specification, Version 2.9 (January 2007)
Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Designs, Codes and Cryptography 2(2), 107–125 (1992)
Kaliski Jr., B.S.: An Unknown Key-Share Attack on the MQV Key Agreement Protocol. ACM Transactions on Information and System Security 4(3), 275–288 (2001)
Krawczyk, H.: SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)
National Institute of Standards and Technology, Special Publication 800-56A, Recommendation for Pair-Wise Key Establish Schemes Using Discrete Logarithm Cryptography (March 2007)
Shim, K.: Unknown Key-Share Attack on Authenticated Multiple-Key Agreement Protocol. Electronics Letters 39(1), 38–39 (2003)
Stinson, D.R.: Cryptography Theory and Practice, Third Edition, 3rd edn. Chapman & Hall/CRC, Boca Raton (2006)
Zhou, H., Fan, L., Li, J.: Remarks on Unknown Key-Share Attack on Authenticated Multiple-Key Agreement Protocol. Electronics Letters 39(17), 1248–1249 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sui, J., Stinson, D.R. (2008). A Critical Analysis and Improvement of AACS Drive-Host Authentication. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy. ACISP 2008. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70500-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-70500-0_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69971-2
Online ISBN: 978-3-540-70500-0
eBook Packages: Computer ScienceComputer Science (R0)