Re: AACS and Processing Key

2007-05-04 Thread Steve Schear
At 11:32 AM 5/2/2007, Perry E. Metzger wrote: Anyone very familiar with AACS have ideas on what optimal attack and defense strategies are? This seems like a fertile new ground for technical discussion. Ed Felton wrote and excellent piece on AACS from the technical and economic/tactical

AACS and Processing Key

2007-05-02 Thread Hal Finney
Since this is the cryptography mailing list, there might be interest in the cryptography behind this infamous key. This is from http://www.aacsla.com/specifications/ , particularly the first spec, Common Cryptographic Elements. The basic cryptography is from Naor, Naor and Lotspiech,

Re: AACS and Processing Key

2007-05-02 Thread Perry E. Metzger
[EMAIL PROTECTED] (Hal Finney) writes: The interesting thing is that publishing a processing key like this does not provide much information about which device was cracked in order to extract the key. This might leave AACSLA in a quandary about what to revoke in order to fix the problem.