[mythtv-users] What would it take to break encrypted QAM
Mache Creeger
mache at creeger.com
Fri Aug 28 15:31:22 UTC 2009
We have DVD ripping for personal use today because someone
successfully broke its encryption scheme and many of us having been
bemoaning the fact that unencrypted QAM is going away to be replaced
by light encryption (potentially DES-56 -
http://anandtech.com/weblog/showpost.aspx?i=637). While I would never
advocate that anyone break national or local laws like DMCA, I
believe it would be an interesting academic exercise to
hypothetically evaluate what it would take to crack future DES-56
enabled CATV distribution architectures.
DTAs are highly cost reduced. They have to be pretty simple devices
and cannot have a lot going on inside. Its been at least 10 years
since the first DES-56 cracking challenges were put on by folks like
EFF and RSA. With the advent of specialized FPGAs
(http://en.wikipedia.org/wiki/Custom_hardware_attack), MapReduce
(http://en.wikipedia.org/wiki/MapReduce), and Hadoop
(http://en.wikipedia.org/wiki/Hadoop) and domain-specific knowledge
about the contents of encrypted messages, is it possible to retrieve
such DES-56 keys? If the keys are downloaded over the cable network,
can you capture them? Can you construct a device with a programmable
serial number that could implement a virtual copy of an existing DTA
on the cable network in your own home? And could you do all of this
in a way that would make the software relatively generic so that it
would require integration by the end user and not necessarily be an
obvious target to content owners and their agents?
These are all interesting questions to ask, hypothetically of course.
-- Mache
More information about the mythtv-users
mailing list