Solved

How does DRM style encryption work, want to create a similar system.

Posted on 2011-09-11
1
617 Views
Last Modified: 2013-12-07
Hello,

I want to protect audio files but I want to make a similar system to DRM where the user downloads a file and then has to Activate it by entering a username and password. A encryption key is then downloaded to the clients computer. The client can then decrypt the files.

The question I have is what stops one sharing his downloaded key with all his friends? With DRM you must download a new key on each computer. How does this work?

Thanks
0
Comment
Question by:vincentvanhst
1 Comment
 
LVL 3

Accepted Solution

by:
cestor earned 500 total points
ID: 36518631
DRM usually works using a symmetric key encryption scheme aka shared secrets where the *same* private key is used for encryption and decryption. Thus, there is always a copy of the private key in memory at the time of decryption. The usual challenge is in how do you distribute that private key in a secure way.

For what you are describing above, you could wrap the symmetric key used for en/decryption of the file in a public key scheme. NB: This is basically how SSL works; you use a public key encryption scheme such as RSA to set up a secure channel and within that channel you transfer the symmetric key that you would use for the DRM
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
How to record audio from input sources to your PC – connected devices, connected preamp to record vinyl discs, streaming media, that play through your audio card: Vista, Windows 7, Windows 8, Windows 8.1 and Windows 10 – both 32 bit & 64.
This video will demonstrate how to customize windows, tools, and control bars, and save them as screen sets. Open and resize windows: Customize the toolbar: Customize the control bar: Customize your tool selections: Your screen set is alread…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now