Solved

How does DRM style encryption work, want to create a similar system.

Posted on 2011-09-11
1
616 Views
Last Modified: 2013-12-07
Hello,

I want to protect audio files but I want to make a similar system to DRM where the user downloads a file and then has to Activate it by entering a username and password. A encryption key is then downloaded to the clients computer. The client can then decrypt the files.

The question I have is what stops one sharing his downloaded key with all his friends? With DRM you must download a new key on each computer. How does this work?

Thanks
0
Comment
Question by:vincentvanhst
1 Comment
 
LVL 3

Accepted Solution

by:
cestor earned 500 total points
ID: 36518631
DRM usually works using a symmetric key encryption scheme aka shared secrets where the *same* private key is used for encryption and decryption. Thus, there is always a copy of the private key in memory at the time of decryption. The usual challenge is in how do you distribute that private key in a secure way.

For what you are describing above, you could wrap the symmetric key used for en/decryption of the file in a public key scheme. NB: This is basically how SSL works; you use a public key encryption scheme such as RSA to set up a secure channel and within that channel you transfer the symmetric key that you would use for the DRM
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Linq help 1 16
C# remove trailing commas from csv file 10 51
Using Simpleject with Class Library 11 25
XML & .net 5 20
Calculating holidays and working days is a function that is often needed yet it is not one found within the Framework. This article presents one approach to building a working-day calculator for use in .NET.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The viewer will learn how to search for and apply Apple Loops, as well as create their own in Logic Pro X. Record a region in the tracks area: Select the region: Go to File > Export > Region to Loop Library: Select the appropriate search terms…
Viewers will get an overview of how to make and use Drum Racks in Ableton Live. Load new Drum Rack into empty MIDI track: Fill rack with audio samples: Re-arrange sample slots as necessary: Adjust parameters of each slot to tailor each sound a…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now