Since this is the cryptography mailing list, there might be
interest in the cryptography behind this infamous key. This is from
http://www.aacsla.com/specifications/ , particularly the first spec,
Common Cryptographic Elements. The basic cryptography is from Naor, Naor
and Lotspiech, http://www.wisdom.weizmann.ac.il/~naor/PAPERS/2nl.html .
The AACS system implements broadcast encryption. This is a scheme which
has also been used for satellite TV. The idea is that you want to encrypt
data such that any of a large number of devices can decrypt it, with also
the possibility of efficiently revoking the keys in a relatively small
subset of devices. The revocation is in case attackers manage to extract
keys from devices and use them to decrypt data without authorization.
Broadcast encryption schemes such as that used by AACS equip each device
with a set of keys, and encrypt a content key to various subsets of
these keys such that each authorized device can decrypt the content key
but the revoked devices cannot. Various methods have been proposed for
achieving this, with tradeoffs between the number of keys held by each
device and the amount of data which must be broadcast to hold all of
the necessary encryptions.
AACS uses a binary tree based method, where each device corresponds to
the leaf node of a tree. It uses a tree with depth of 31, so there are
2^31 leaf nodes and 2^32 - 1 nodes in all. At this point it is believed
that software players of a particular type are all considered a single
device, while hardware players are each a unique device. This will allow
individual hardware players to be revoked, while requiring all software
players of a given brand or type to be revoked at once. This tradeoff
is assumed to be acceptable because it is easy to get a new version of
a software player.
The method of assigning and handling the keys is called subset-difference.
It allows a single encryption to be decrypted by any of the devices in
a given subtree of the main tree, minus any sub-subtree of that subtree.
In this way, any set of revoked nodes can be handled by the union of an
appropriate chosen set of subset-difference encryptions. For example,
suppose two nodes A and B are to be revoked. Let A be to the left of B,
and call their lowest common ancestor node C. Encrypt to the whole tree
minus the subtree rooted at C; also to C's left child's subtree minus A;
also to C's right child's subtree minus B. This will cover all nodes
except A and B.
To implement subset-difference, the root node of each subtree is assigned
a unique key called a device key. Then going down the subtree from that
node, each node gets its own device key as a distinct one-way hash of its
parent's device key. The result is that if you know a node's device key,
you can deduce the device keys of all descendants of that node.
This assignment of keys is carried out independently for each subtree,
so a node at level n has n+1 device keys associated with it, one for
each of the n+1 subtrees that it is a part of.
Leaf nodes correspond to devices, but devices do not get the device keys
for their leaf node. Instead, they are given the device keys of the
sibling node of their leaf, as well as the device keys of all of the
siblings of their ancestor nodes. Because knowing a device key allows
deducing the device keys of all its descendents, this assignment allows
each physical device to deduce all device keys in the tree except for
their ancestor nodes: those on the one branch of the tree leading to
the leaf node.
To implement subset-difference encryption, suppose we want to encrypt
to all nodes in the subtree rooted at node A except those nodes in the
sub-subtree rooted at node B. Then we encrypt to the device key of node
B that was assigned as part of the device key system rooted at node A.
All nodes in the node-A subtree except those below node B can deduce
this device key, because B is not one of their ancestors. Nodes below
B cannot deduce the device key because B is an ancestor, and nodes not
below A cannot deduce it because this set of device keys was unique to
the node-A subtree.
In order to get the system started, one node is considered pre-revoked and
not assigned to any physical device. Initially, the data is encrypted
to the device key assigned to that node as part of the system for the
whole tree. Every device will be able to deduce that device key and
decrypt the data.
That one key is the processing key about which so much fuss is
being made. All HD-DVD disks that were initially produced have their
content keys encrypted to that single key. Knowing this processing key,
along with other information available from the disk, allows determining
all necessary decryption keys and provides access to the plaintext of
the content. With this value having been published, all of the first
generation of HD-DVD disks can be played.
The interesting thing is that publishing a processing key like this does
not provide