Saturday, March 30, 2019
Ebook Security With Adobe Adapt DRM
E password Security With adobe Adapt DRMAbstractEBooks empennage be secured in conf utilise ways dependant on device or format. The hear focuses on the encryption regularity use by Adobe in their Adept DRM utilize to secure EPUB and PDF formats.The report describes what a DRM is and its uses and purposes within the industry, how Adobe have adapted this for their purpose, the RSA and AES encryptions used, along with any advancements and vulnerabilities with the mold.Recommendations argon then condition on how the process could be improved and conclusions drawn on the boilers suit effectiveness of the outline.Table of Contents2. Literature follow2.1 What is DRM2.2 RSA with PKCS1 v1.5 aggrandise2.2.1 PKCS 12.2.2 RSA2.2.2.1 GENERATE A PUBLIC describe AND PRIVATE KEY2.2.3 Padding2.3 AES in CBC mode with a random generated IV4. VulnerabilitiesSecurityKnown attacksSide-channel attacksNIST/CSEC validationTest transmitters5. Recommendations6. Conclusion7. References2. Literature review2.1 What is DRM?digital Rights Management or DRMs restrict the ability to print, modify, lend or use the extended features of purchased digital media specifically EBooks. Restriction levels are open on publishers, distributors, device and even while. These restrictions are also used to spring the number of E-Readers a al-Quran can be viewed on and time restrictions on features can be added. DRMs come in different forms, at presend there are eight main types, excluding obscure formats or those used in non-English countries, and a large proportion of these are unsuitable with each other. While there is no de-facto standard, Adobe DRM is the most prolific, although amazon Kindle and Apple iBooks use proprietary DRMs.The Adobe ADEPT DRM system has five learn referencesAdobe Content server is answerable for the storage and management of EBooks.Adobe Activation Server is responsible for storing and trailing Adobe IDs and authorised devices.Adobe Content Server Message (ACSM ) wedge carries the details of the book including name, synopsis and location.Adobe ID is the unique credit that is associated with the user. This is call for to unlock the ACSM.Adobe Reader Software Development Kit (SDK) is used for distributers to create their own mobile scaning apps. (Jenny Ellis and Kyle Cook (2013))The following process is used when a purchased EBook with an Adobe Adept DRM is opened with Adobe digital Editions.1. A unique user cardinal is created for the user account encrypted with RSA with PKCS1 v1.5 dramatize by the E-Reader software. The account information not the device is used to create the learn therefore plying an EBook with DRM to be read on various devices. This is required to open the ACSM file.2. Once an EBook is purchased a distinguish for decryption cognize as the book key or ACSM is sent to the user. This book key is encrypted by the distributor using the unique user key created in step one. The book encryption is AES with enter Bloc k Chaining with an Initialization vector that is randomly generated.3.T he E-Reader software uses the user key to decrypt the book key and subsequently the book key is used to decrypt the EBook and allow access to the device or software.Copying is prevented by requiring the user key to decrypt the book key as it is not stored in a decrypted form on the device or software. To enable reading on another device it requires authorisation, once complete the user key is sent and the device is registered allowing EBook to be read on the newly enabled device. (Xiao Zhang 201)Image 01 The DRM surgical process2.2 RSA with PKCS1 v1.5 paddingRSA with Public Key Cryptography Standards (PKCS) 1 and padding is used to encrypt the unique user account key, below is a description of how each part works to protect the user identification and eBook.2.2.1 PKCS 1PKCS 1 is the first standard of mathematical recommendations and properties for the correct implementation of RSA familiar and private keys. T he key pairs are based on a modulus of two distinct large hot flash number. (Weisstein 2015)2.2.2 RSA Image 02 How RSA Encryption kit and caboodle (Page dress 2010)In 1977 Ron Rivest, Adi Shamir and Leonard Adleman first described RSA public key or asymmetric cryptography. RSA uses two keys, one public one private that are mathematically linked. As the name suggests public keys can be share with anyone whereas the private key must be kept secure. Either key can be used to encrypt the data and the opposite key is used to decrypt. RSA if implemented correctly can provide confidentiality, integrity and non-reputability of electronic communications and data storage. (Rouse 2014)2.2.2.1 Generating Public and Private KeysThe first step to generating the public and private keys is two prime numbers. A prime number is a number greater 1 and is only divisible by 1 or itself. Examples of prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41.These two prime numbers p and q are cypher together to give n and multiplied together minus one to give t.For Examplep = 29q= 31n = p * q = 29 * 31 n = 899t = ( p -1 ) * ( q 1) = ( 29 1 ) * ( 31 1 ) t = 840Another prime number e is required, although e needs to be a recounting prime to t, therefore t cannot be divisible by e.Since t = 840, e cannot be 2, 3, 5 or 7 e can be 11, 13, 17 etc. 11 was selected as it was the first congenator prime to t. e = 11.The last figure required for the calculations is d. The formula used to ascertain d isd * e = 1 mod t (d * 11) / 840 will result in the remainder of 1. To find d the contrary of e mod t is required and is often computed using the across-the-board Euclidean Algorithm. ( 611* 11) / 840 = 8 r 1 d = 611.The public key is n and e 899 and 11.The private key is n and d 899 and 611.(Page Don 2010)2.3 AES in CBC mode with a random generated IVAES with Cipher Block Chaining with an Initialization vector that is randomly generated is used to encrypt the book key o r ACSM, below is a description of how each part works to protect the eBook to prevent unauthorised use.3. VulnerabilitiesOn paper, this encryption intention ensures a strong DRM mechanism. However, it was soon observed that the software used to read ePubs and PDFs, Adobe digital Editions, uses a very weak obfuscation to bedim the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. Newer versions of the Adobe Digital Editions use more cryptic ways of concealing the per-user key, but attacks comfort exist to retrieve it from the registry4. RecommendationsAdobe Digital Editions, uses a very weak obfuscation to hide the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. N ewer versions of the Adobe Digital Editions use more cryptic ways of hiding the per-user key, but attacks still exist to retrieve it from the registryfor better useable security and lonelinessWrite withtheknowledgeyou have gained duringthelecturesandalso healthyintuition about improvements that can be made to ensure better security and concealment of all involved state holders.You arenotasked toprovide possible solutionsthere should be no limitto your imagination however withsensible intuition.You can discuss systems, frameworks, protocols, tools, best practices, governmentregulations etc.5. Conclusion foreground important facts and findings.6. Referenceshttp//www.inthelibrarywiththeleadpipe.org/2013/building-a-community-of-readers-social-reading-and-an-aggregated-ebook-reading-app-for-libraries/http//www.cse.wustl.edu/jain/cse571-11/ftp/drm/sec2.3.1E-Book Security and Preventing Theft and Unauthorised edithttp//inkwelleditorial.com/prevent-ebook-thefthttp//ebookforum.info/how-can -i-stop-theft-of-my-ebook/http//www.star-force.com/press/articles/?news=2562DRMhttp//ebookarchitects.com/learn-about-ebooks/drm/https//www.editionguard.com/
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.