Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.7.843

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System  

Park, Chan-Kil (한성디지털대학교 멀티미디어학과)
Kim, Jung-Jae ((주)RetailTech)
Lee, Kyung-Seok (건국대학교 정보통신대학원)
Jun, Moon-Seog (숭실대학교)
Abstract
This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.
Keywords
DRM; Symmetric Key; Session Authentication; Session Key Exchange;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Joshua Duhl, 'Digital Rights Management : A Definition,' IDC 2001
2 Microsoft : http://www.microsoft.com/windows/windowsmedia/drm.asp
3 Whitfield Diffie and Martin Hellman, 'New Directions in Cryptography,' IEEE Transaction on Information Theory, Vol.IT-22, No.6, pp.644-654, November, 1976   DOI
4 Intertrust : http://www.intertrust.com/main/overview/drm.html
5 Joshua Duhl and Susan Kevorkian, 'Understanding DRM system: An IDC White paper,' IDC, 2001
6 Sung, J Park, 'Copyrights Protection Techniques,' Proceedings International Digital Content Conference, Seoul Korea, Nov., 28-29, 2000
7 V.K. Gupta, 'Technological Measures of Protection,' Proceedings of International Conference on WIPO, Seoul Korea, October, 25-27, 2000
8 Brad Cox, Superdistribution : Object As Property on the Electronic Frontier, Addision-Wesley, May, 1996
9 김정재 외 2명, '시큐리티 에이전트를 이용한 사용자 인증과 DRM 보안 시스템 설계,' 정보처리학회논문지C, Vol.12-C, No.7, pp.973-980, 2005. 12   과학기술학회마을   DOI
10 김정재 외 2명, '동영상 데이터 보호를 위한 공유키 풀 기반의 DRM 시스템,' 정보처리학회논문지C, Vol.12-C, No.2 pp.183-190, 2005. 4   과학기술학회마을   DOI
11 김지홍, 이만영, 류재철, 송유진, 염홍렬, 이임영, 전자상거래보안기술, 생능출판사, 2001