Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How does DRM style encryption work, want to create a similar system.

Posted on 2011-09-11
1
Medium Priority
?
634 Views
Last Modified: 2013-12-07
Hello,

I want to protect audio files but I want to make a similar system to DRM where the user downloads a file and then has to Activate it by entering a username and password. A encryption key is then downloaded to the clients computer. The client can then decrypt the files.

The question I have is what stops one sharing his downloaded key with all his friends? With DRM you must download a new key on each computer. How does this work?

Thanks
0
Comment
Question by:vincentvanhst
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 3

Accepted Solution

by:
cestor earned 2000 total points
ID: 36518631
DRM usually works using a symmetric key encryption scheme aka shared secrets where the *same* private key is used for encryption and decryption. Thus, there is always a copy of the private key in memory at the time of decryption. The usual challenge is in how do you distribute that private key in a secure way.

For what you are describing above, you could wrap the symmetric key used for en/decryption of the file in a public key scheme. NB: This is basically how SSL works; you use a public key encryption scheme such as RSA to set up a secure channel and within that channel you transfer the symmetric key that you would use for the DRM
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The article shows the basic steps of integrating an HTML theme template into an ASP.NET MVC project
Viewers will learn how to turn a Live Set into a compressed Live Pack file, and how to install Live Packs. Make: File > Collect All And Save: File > Manage Files: Click Manage Project: Click Create Pack: Select save location: Install: Doub…
Viewers will learn how to create and use Simpler instruments in Ableton Live. Load new Simpler into an empty MIDI track: Select a sample and drop it into sample window in Simpler: If sample is not pitched at C3, adjust tuning with Transpose para…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question