13.07.2015 Views

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

II. <strong>What</strong> Does <strong>DRM</strong> Look Like?Since the beginnings of the personalcomputer revolution, more than a quarterof a century ago, a number ofapproaches and technologies have beendeveloped to prevent unauthorizedcopying of, or to otherwise control digitalcontent. There are three broadclasses of approaches that are currentlyused, or that have been proposed in variousstandards-setting or legislative proceedings.Sometimes these approachesare used by themselves, and sometimesin combination with one another.A. Encrypting orScrambling ContentA common approach to copy protectionis encryption — the use of a mathematical/computationalprocess to scrambleinformation so that only those who havethe right key or keys can obtain accessto it. This, for example, is how yourDVD movies work — their content isscrambled so that only DVD playersthat have the right keys can decrypt thecontent so that you can watch the DVDmovie. Similarly, if you receive cable orsatellite television, your TV serviceprovider normally scrambles content inways that prevent most unauthorizedpeople (that is, nonsubscribers) fromgetting access to it.The basic approach for encryption isto encrypt the digital content so thatonly a player with both the decryptiondevice or software and the proper keycan play the content. The contentowner can broadcast the content toeveryone but unless the recipient hasvalid decryption keys he cannot play thecontent. Scrambling is a similar copyprotectionapproach, but without a userappliedkey; instead, the key thatincludes the unscrambling algorithmresides in the player device (which maybe hardware, or software, or both).There are several varieties to encryption-basedcopy protection. In the simplesttype, all content is encrypted undera single master key. This is considered avery fragile scheme because, once thesingle key is compromised, the entire7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!