At 11:32 AM 5/2/2007, Perry E. Metzger wrote:
Anyone very familiar with AACS have ideas on what optimal attack and
defense strategies are? This seems like a fertile new ground for
technical discussion.
Ed Felton wrote and excellent piece on AACS from the technical and
economic/tactical
Since this is the cryptography mailing list, there might be
interest in the cryptography behind this infamous key. This is from
http://www.aacsla.com/specifications/ , particularly the first spec,
Common Cryptographic Elements. The basic cryptography is from Naor, Naor
and Lotspiech,
[EMAIL PROTECTED] (Hal Finney) writes:
The interesting thing is that publishing a processing key like this does
not provide much information about which device was cracked in order
to extract the key. This might leave AACSLA in a quandary about what to
revoke in order to fix the problem.