Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research...

48
Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios

Transcript of Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research...

Page 1: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Efficient Fingerprinting toProtect Digital Content

Josh BenalohGideon Yuval

Microsoft Research

FingerMark

Andrew RosenMicrosoft Studios

Page 2: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Fingerprinting of Content

If protected content is somehow released from a playback device, it may be desirable to have a method to enable identification of the device from which the content was released.

Page 3: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Fingerprinting by the Device

A simple approach to fingerprinting is have have each playback device insert a “unique” identifying signal into its output stream.

Drawbacks …

• A compromised player can bypass this step.

• Deployed fingerprinting schemes are difficult to update.

Page 4: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

It would be nice if it were possible to give different keys to each playback device such that the content is slightly different when decrypted with distinct keys.

Page 5: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

EncryptedContent

DecryptedContent

Decrypted

Content

Key 2Key 1

Page 6: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

A simple observation is that “differential decryption” is possible to achieve (although usually impractical) by creating two separate and slightly different copies of the original content.

Page 7: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

EncryptedContent

DecryptedContent

Decrypted

Content

Key 2Key 1

Page 8: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

EncryptedContent

DecryptedContent

Decrypted

Content

Key 2Key 1

Encrypted

Content

Page 9: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

The efficiency and utility of differential decryption can be greatly enhanced by dividing content into “clips” and separately encrypting two slightly different versions of each clip.

Page 10: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Encrypted Clip 1A Encrypted Clip 1B

Encrypted Clip 2A Encrypted Clip 2B

Encrypted Clip 3A Encrypted Clip 3B

Encrypted Clip 4A Encrypted Clip 4B

Page 11: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Encrypted Clip 1A Encrypted Clip 1B

Encrypted Clip 2A Encrypted Clip 2B

Encrypted Clip 3A Encrypted Clip 3B

Encrypted Clip 4A Encrypted Clip 4B

Key 1A

Key 2A

Key 3A

Key 4A

Key 1B

Key 2B

Key 3B

Key 4B

Page 12: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Clear Clip 1A Clear Clip 1B

Clear Clip 2A Clear Clip 2B

Clear Clip 3A Clear Clip 3B

Clear Clip 4A Clear Clip 4B

Key 1A

Key 2A

Key 3A

Key 4A

Key 1B

Key 2B

Key 3B

Key 4B

Page 13: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

If each playback device is given exactly one of the two decryption keys for each clip, the output generated by that device will form a pattern that can be regarded as a fingerprint of the device.

Page 14: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Clear Clip 1A Encrypted Clip 1B

Encrypted Clip 2A Clear Clip 2B

Clear Clip 3A Encrypted Clip 3B

Clear Clip 4A Encrypted Clip 4B

Key 1A

Key 3A

Key 4A

Key 2B

Page 15: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Encrypted Clip 1A Clear Clip 1B

Clear Clip 2A Encrypted Clip 2B

Clear Clip 3A Encrypted Clip 3B

Encrypted Clip 4A Clear Clip 4B

Key 2A

Key 3A

Key 1B

Key 4B

Page 16: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

The content need not be doubled!

• It is not necessary to divide the entire content into clips!!!

• It is only necessary to place these parallel clips into a small portion of the content.

Page 17: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Even if the keys are removed from a playback device, content decrypted with its keys will retain its fingerprint.

The fingerprint is dependent only upon the decryption keys used – not the hardware that held them.

Page 18: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Differential Decryption

Any method (such as watermarking) can be used to distinguish the two versions of each clip.

The differentiation scheme is dynamic and need not be fixed by the playback device.

Page 19: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Are More Keys a Problem?

The number of content keys that must be transmitted to a playback device seems to grow with the number of clips.

Page 20: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

More Keys are not a Problem

As many keys as desired can be packed into the space of a single key.

Either of two crypto tricks can be used.

1. Broadcast Encryption

2. A new application of a technique invented by Chick and Tavares

Page 21: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast vs. Narrowcast

The method can be illustrated by showing a grid of participants against clips. Each participant is entitled to the keys for the clips shown in orange.

Page 22: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast vs. Narrowcast

Recipients

Clips

Page 23: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast vs. Narrowcast

Recipients

Clips

Page 24: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast

Using Broadcast Encryption, for each clip, the set of participants entitled to that clip is determined, and a single encryption of that clip’s key is produced that enables those (and only those) participants to derive that clip’s key.

Page 25: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast

Recipients

Clips

Page 26: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Broadcast Encryption

• One encryption per clip key.

• Time to encrypt/decrypt each clip key is proportional to number of copies of content distributed.

• Collusion can allow recipients access to keys to which they are not entitled.

Page 27: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

Using the technique of Chick and Tavares, for each participant, the set of clips to which that participant is entitled is determined, and a single value is produced that allows the participant to derive those (and only those) clip keys.

Page 28: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

Recipients

Clips

Page 29: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

Recipients

Clips

Page 30: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

• One encryption per recipient.

• Time to encrypt/decrypt each clip key is proportional to the number of clip keys.

• Collusion does not provide access to additional clip keys.

• Amortization and other efficiencies can significantly reduce encrypt/decrypt times.

Page 31: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

Some details of the mathematics behind the narrowcast method are presented in the following slides.

Page 32: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Narrowcast

Clip 1A Clip 1B

Clip 2A Clip 2B

Clip 3A Clip 3B

Clip 4A Clip 4B

Page 33: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Small Prime Assignment

Clip 1A Clip 1B

Clip 2A Clip 2B

Clip 3A Clip 3B

Clip 4A Clip 4B

Prime 1A

Prime 2A

Prime 3A

Prime 4A

Prime 1B

Prime 2B

Prime 3B

Prime 4B

Page 34: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Clip Key Encryption

• Select a large composite integer N.

• Let y in ZN*.

• Compute each clip key as y1/p mod N where p is the small prime associated with the clip.

Page 35: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Clip Key Encryption

• Select a large composite integer N.

• Randomly select an integer x in ZN*.

• Let P = (all small clip primes).

• Let y = xP mod N.

• Compute clip key k = Hash(y1/p mod N) where p is the small prime associated with the clip.

Page 36: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Clip Key Distribution

• For a given recipient, define ρ to be the product of all small clip primes associated with clips to which that recipient is not entitled.

• Give that recipient the amalgamated key value xρ mod N.

Page 37: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Clip Key Decryption

To obtain a single clip key, a recipient can take amalgamated clip key xρ mod N. and raise it to the power of all appropriate small primes except the small prime p associated with the desired clip.

Page 38: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Security of other Keys

Shamir’s Root Independence Lemma (1980) shows that given y1/p mod N and y1/q mod N, finding y1/r mod N is as hard as computing arbitrary roots modulo N (RSA assumption) unless r|(pq).

Page 39: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortization

• A set of m keys can be decrypted using time m log m beyond the time to decrypt a single key.

• After an initial step linear in the number of keys, each of m subsequent keys can be delivered in log m time.

Page 40: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

Page 41: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

x

Page 42: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

x

xp5p6p7p8

Page 43: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

x

xp5p6p7p8

xp1p2p5p6p7p8

Page 44: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

x

xp5p6p7p8

xp1p2p5p6p7p8

xp1p2p4p5p6p7p8

Page 45: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

m leaves

Page 46: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

m leaves

log m levels

Page 47: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Amortized Decryption

1,8

1,4

1,2

1,1 2,2

3,4

3,3 4,4

5,8

5,6

5,5 6,6

7,8

7,7 8,8

m leaves

log m levelsm small primeexponentiations per level

Page 48: Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.

Conclusions

• Flexible fingerprinting methods are an important tool in content protection.

• Large amounts of keying material may be required for such fingerprinting.

• The methods described minimize the bandwidth requirements for these schemes.