Media Key Block

The Media Key Block (MKB) is one of the keys included inside the copying protection system (DRM) AACS. This system is used to protect Blu-ray and HD DVD formats from being copied. The system was developed by companies from the film industry and the electronics industry including IBM, Intel, Microsoft, Matsushita (Panasonic), Sony, Toshiba, The Walt Disney Company and Warner Bros.

The MKB key is found in the physical support (the disc) together with the content of the disc encrypted. The MKB has the function of validating the reproduction devices on which the disc is being played and obtaining, from the devices codes, the key that will allow the decryption of the disc content. That is the Media Key (Km).

AACS decryption process

How it works

Blu-Ray or HD-DVD have as content the encrypted data (usually video), the Volume ID (VID), the Encrypted Title Key(s) and the MKB. The MKB is also found encrypted in the disc to prevent it from being extracted off the disc and being manipulated and/or reproduced by another non authorized device.

Process to obtain the Media key, from the MKB and the Device Keys

The reproduction device will have available its own keys, uniques for each model, called Device Keys. These keys are conceded by the AACS organization. In the moment of the reproduction, one of these keys will decrypt the MKB contained on the disc and as a result of this process we obtain the Media key.

The Media key is combined together with the VID (Volume ID) and as a result we obtain the Volume Unique Key (Kvu). With the Kvu we are able to decrypt the Encrypted Title Key and obtain the Title keys which finally allows to decrypt the content of the disc and view it.[1]

This way the system can protect contents from being viewed in devices that have not been authorized. Therefore, the system allows modifying the MKB in future relaunch of a determined content in order to select the devices in which this content can be viewed.

Key structure

Media Key Block structure

Even though it seems a simple mechanism the MKB key which is found in the physical support of the disc follows a complex structure. The MKB is distributed in blocks that contain the version of the Media key, the list of devices that have been revoked, a field to authenticate the MKB, and other fields that specify parameters corresponding to the decrypting algorithm and define the structure of the own Media Key and also the Media key itself.

The MKB itself is found inside the field Media Key Data Record and has a variable length but it is always a multiple of 4 bytes.[2]

Advantages and disadvantages

Many consumer associations have complained against this protection system since it can lead to a situation where physical devices cannot reproduce contents even though they do not infringe any intellectual property. This situation can be achieved either by trying to reproduce some content in old devices, therefore not certified by the AACS, or because the device model has been disallowed by AACS, as a result all the owners of that device model will not be able to view contents protected with the MKB.

This situation has become even worse with the recent publication in multiple web sites of the Media Key, that is, the key that allows decrypting the Volume ID[3] and at the same time, the encrypted content, without the need of using a certified device by the AACS or a valid MKB. This is especially critical because nowadays the Volume ID is the same in all the Blu-ray or HD-DVDs with equal content.

gollark: Go \frac{\left( x-3\right)\cdot-1}{2.14708725\cdot10^{+8}}\cdot\left( x-5\right)\cdot\left( x-7\right)\cdot\left( x-11\right)\cdot\left( x-13\right)\cdot\left( x-17\right)\cdot\left( x-19\right)\cdot\left( x-23\right)\cdot\left( x-29\right)+\frac{ x-2}{3.72736\cdot10^{+7}}\cdot\left( x-5\right)\cdot\left( x-7\right)\cdot\left( x-11\right)\cdot\left( x-13\right)\cdot\left( x-17\right)\cdot\left( x-19\right)\cdot\left( x-23\right)\cdot\left( x-29\right)+\frac{\left( x-2\right)\cdot-1}{1.3934592\cdot10^{+7}}\cdot\left( x-3\right)\cdot\left( x-7\right)\cdot\left( x-11\right)\cdot\left( x-13\right)\cdot\left( x-17\right)\cdot\left( x-19\right)\cdot\left( x-23\right)\cdot\left( x-29\right)+\frac{ x-2}{1.01376\cdot10^{+7}}\cdot\left( x-3\right)\cdot\left( x-5\right)\cdot\left( x-11\right)\cdot\left( x-13\right)\cdot\left( x-17\right)\cdot\left( x-19\right)\cdot\left( x-23\right)\cdot\left( x-29\right)+\frac{\left( x-2\right)\cdot-5}{3.5831808\cdot10^{+7}}\cdot\left( x-3\right)\cdot\left( x-5\right)\cdot\left( x-7\right)\cdot\left( x-13\right)\cdot\left( x-17\right)\cdot\left( x-19\right)\cdot\left( x-23\right)\cdot\left( x-29\right)+\frac{ x-2}{6.7584\cdot10^{+6}}\cdot\left( x-3\right)\cdot\left( x-5\right) yourself.
gollark: They have a decent insult library.
gollark: `Defaults insults`
gollark: Of course it does.
gollark: Oh, like sudo with the insults setting on, but hidden somehow.

References

  1. "Recordable Video Book (Rev. 0.91)" (PDF). AACS reference. Archived from the original (PDF) on 2008-09-07. Retrieved 2008-12-07.
  2. "Introduction and Common Cryptographic elements (Rev 0.91)" (PDF). AACS reference. Archived from the original (PDF) on 2012-03-01. Retrieved 2008-12-07.
    "Pre-recorded Video Book (Rev 0.92)" (PDF). AACS reference. 2007-10-12. Archived from the original (PDF) on 2008-09-07. Retrieved 2008-12-07.
  3. Martell, Lindsay (2007-01-26). "Blu-ray and HD DVD Encryption Cracked". Archived from the original on 2007-11-03. Retrieved 2008-12-07.
    Kaplan, Alexander (2007-04-05). "Illegal Offering of Title/Volume Keys to Circumvent AACS Copyright Protection: hdkeys.com" (PDF).
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.