09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0
ps: blu-ray just won
How to decrypt a
DVD: in haiku form.
(Thanks, Prof. D. S. T.)
------------------------
(I abandon my
exclusive rights to make or
perform copies of
this work, U. S. Code
Title Seventeen, section
One Hundred and Six.)
Muse! When we learned to
count, little did we know all
the things we could do
some day by shuffling
those numbers: Pythagoras
said "All is number"
long before he saw
computers and their effects,
or what they could do
by computation,
naive and mechanical
fast arithmetic.
It changed the world, it
changed our consciousness and lives
to have such fast math
available to
us and anyone who cared
to learn programming.
Now help me, Muse, for
I wish to tell a piece of
controversial math,
for which the lawyers
of DVD CCA
don't forbear to sue:
that they alone should
know or have the right to teach
these skills and these rules.
(Do they understand
the content, or is it just
the effects they see?)
And all mathematics
is full of stories (just read
Eric Temple Bell);
and CSS is
no exception to this rule.
Sing, Muse, decryption
once secret, as all
knowledge, once unknown: how to
decrypt DVDs.
Arrays' elements
start with zero and count up
from there, don't forget!
Integers are four
bytes long, or thirty-two bits,
which is the same thing.
To decode these discs,
you need a master key, as
hardware vendors get.
(This is a "player
key" and some folks other than
vendors know them now.
If they didn't, there
is also a way not to
need one, to start off.)
You'll read a "disk key"
from the disc, and decrypt it
with that player key.
You'll read a "title
key" for the video file
that you want to play.
With the disk key, you
can decrypt the title key;
that decrypts the show.
Here's a description
of how a player key will
decrypt a disk key.
You need two things here:
An encrypted disk key, which
is just six bytes long.
(Only five of those
are the key itself, because
"zero" marks the end.
So that's five real bytes,
and eight times five is forty;
in the ideal case,
forty bits will yield
just short of two trillion
possible choices!
Ian Goldberg once
recovered a key that long
in seven half-hours.
But his office-mate
David Wagner points out that
it's impossible
to achieve what the
DVD CCA seems
to want to achieve,
even by making
the key some reasonable,
"adequate" key-length:
There's no way to write
a "secure" software player
which contains the key
and runs on PCs,
yet somehow prevents users
from extracting it.
If the player can
decrypt, Wagner has noted,
users can learn how.)
This is a pointer,
"KEY", to those bytes, and when we're
done, they'll be clear-text.
Oh, the other thing!
Called "im", a pointer to six
bytes: a player key.
(Now those six bytes, the
DVD CCA says
under penalty
of perjury, are
its trade secret, and you are
breaking the law if
you tell someone that,
for instance, the Xing player
used the following:
Eighty-one; and then
one hundred three -- two times; then
two hundred (less three);
two hundred twenty
four; and last (of course not least)
the humble zero.)
We will use these few
internal variables:
t1 through t6,
unsigned integers.
k, pointer to five unsigned
bytes. i, integer.
So here's how you do
it: first, take the first byte of
im -- that's byte zero;
OR that byte with the
number 0x100
(hexadecimal --
that's two hundred and
fifty-six to you if you
prefer decimal).
Store the result in
t1. Take byte one of im.
Store it in t2.
Take bytes two through five
of im; store them in t3.
Take its three low bits
(you can get them by
ANDing t3 with seven);
store this in t4.
Double t3, add
eight, subtract t4; store the
result in t3.
Make t5 zero.
Now we'll start a loop; set i
equal to zero.
i gets values from
zero up to four; each time,
do all of these steps:
Use t2 for an
index into Table Two:
find a byte b1.
Use t1 for an
index into Table Three:
find a byte b2.
Take exclusive OR
of b1 with b2 and
store this in t4.
Shift t1 right by
a single bit (like halving);
store this in t2.
Take the low bit of
t1 (so, AND it with one),
shift it left eight bits,
then take exclusive
OR of that with t4; store
this back in t1.
Use t4 for an
index into Table Four:
find a byte and store
it back in t4.
Shift t3 right by three bits,
take exclusive OR
of this with t3,
shift this right by one bit, and
take exclusive OR
of this with t3,
shift this right by eight bits, and
take exclusive OR
of this with t3,
shift this right by five bits, and
(No exclusive OR!
Orange you glad I
didn't say banana?) take
the low byte (by AND
with two hundred and
fifty-five); now store this
into t6. Phew!
Shift t3 left eight
bits, take OR with t6, and
store this in t3.
Use t6 for an
index into Table Four:
find a byte and store
it in t6. Add
t6, t5, t4; store
the sum in t5.
Take t5's low byte
(AND t5 with two hundred
fifty five) to put it
in the ith byte of
the vector called k. Now shift
t5 right eight bits;
store the result in
t5 again. Now that's the
last step in the loop.
No sooner have we
finished that loop than we'll start
another; no rest
for the wicked nor
those innocents whom lawyers
serve with paperwork.
Reader! Think not that
technical information
ought not be called speech;
think not diagrams,
schematics, tables, numbers,
formulae -- like the
terrifying and
uniquely moving, though cliche,
Einstein equation
"Energy is just
the same as matter, but for
a little factor,
speed of light by speed
of light, and we are ourselves
frozen energy."
Einstein's formula
to convert from joules into
kilogram-meters
squared per second squared,
for all its power, uses
just five characters.
But Einstein wrote to
physicists: formal, concise,
specific, detailed.
And sometimes we write
to machines to teach them how
tasks are carried out:
and sometimes we write
to our friends to show a way
tasks are carried out.
We write precisely
since such is our habit in
talking to machines;
we say exactly
how to do a thing or how
every detail works.
The poet has choice
of words and order, symbols,
imagery, and use
of metaphor. She
can allude, suggest, permit
ambiguities.
She need not say just
what she means, for readers can
always interpret.
Poets too, despite
their famous "license" sometimes
are constrained by rules:
How often have we
heard that some strange twist of plot
or phrase was simply
"Metri causa", for
the meter's sake, solely done
"to fit the meter"?
Programmers' art as
that of natural scientists
is to be precise,
complete in every
detail of description, not
leaving things to chance.
Reader, see how yet
technical communicants
deserve free speech rights;
see how numbers, rules,
patterns, languages you don't
yourself speak yet,
still should in law be
protected from suppression,
called valuable speech!
Ending my appeal
on that note, I will describe
the second loop. Store
nine in i; i gets
values from nine down to
naught. Each time, do this:
Use i+1 as
an index into Table
Zero: find a byte.
Call that byte p1.
Now use i for an index
in Table Zero:
find a byte and
call that byte p0. Now
use p1 as an
index into k
(a vector, remember?); thus
find a byte b1.
Use p1 as an
index into KEY, as well:
find a byte, use that
byte as an index
into Table One. Call the
byte you find b2.
Use p0 as
an index into KEY to
find a byte b3.
Take exclusive OR
of b1, b2, b3,
and store that in KEY
(not just anywhere,
though!). In KEY at the byte that's
indexed by p1.
That's it for that loop
and also for the task of
disk key decryption.
Title keys are next.
It isn't hard to decrypt
one. The rule's the same!
Well, there's one slight
change: where you use t6, it's
Table "Five", not "Four".
And this time im is
the decrypted disk key, and
KEY the title key.
How would you like to
hear how to decrypt both the
disk and title keys?
All we'll need are the
encrypted versions and a
player key. No sweat!
We'll call the title
key TKEY, a pointer to
six bytes, encrypted.
We'll call the disk key
DKEY, a pointer to six
bytes, encrypted too.
We will use a few
internal variables,
once again: so i,
an integer, will
serve again as loop index.
im1 is six bytes,
im2 is six bytes.
Both vectors and the latter
holds our player key.
Now I told you once
about a player key I
think they gave to Xing --
I don't know this for
sure; DVD CCA
said so in court, though.
Otherwise I'd say
that this is just a "magic
number" from on high,
vouchsafed to mortals
from the mouths of the Muses
for our benefit.
In reality
I'm told it was discovered
by M.o.R.E.,
some Europeans
two-thirds of whom are today
still anonymous.
I don't want to make
a long excursus right now
on why that's not bad:
reverse engineers
in many fields are heroes
of technology,
for advancing the
knowledge of their colleagues or
of the public mind.
Yet in software the
recent trend has been to brand
tinkerers as thieves!
I urge you to read
the Crypto-gram newletter
on why that's not so.
Bruce can make the point
better there than I can here,
sticking to haiku.
So this number is,
once again, the player key:
(trade secret haiku?)
"Eighty-one; and then
one hundred three -- two times; then
two hundred (less three);
two hundred twenty
four; and last (of course not least)
the humble zero."
If you didn't know
a valid player key, then
you could find one out --
ask Frank Stevenson,
or his fellow programmer
wise Andreas Bogk.
All we have to do
is this: copy our DKEY
into im1,
use the rule above
that decrypts a disk key (with
im1 and its
friend im2 as
inputs) -- thus we decrypt the
disk key im1.
Use the rule above
that decrypts a title key.
TKEY and our new
disk key im1
are inputs now -- we decrypt
TKEY, and we're done.
That was straightforward.
Probably we didn't need
to explain this part,
but computers are
very literal, so we
might as well do so.
This part is really
exciting for movie fans:
decrypt DVDs!
Well, at least sectors
of DVDs, but they are
made up of sectors.
Sectors (of two to
the eleventh bytes) are the
encryption units.
Rejoice then, get some
popcorn out, and butter if
you aren't vegan.
Margarine works well
if you're vegan, or if you
are watching your weight.
I've heard you can put
tarragon on your popcorn.
I haven't tried it.
Why did I tell you
to rejoice? Because we are
about to watch a
movie, at least if
we have a good MPEG-2
player close at hand.
We need two things now,
though, beyond our MPEG-2
players and popcorn:
A vector "SEC" of
two thousand forty-eight bytes,
disk sector contents.
(These start off in their
encrypted form, but we will
leave them decrypted.)
And a vector KEY
of six bytes, the decrypted
title key we'll use.
We will use these few
internal variables:
t1 through t6,
unsigned integers.
Remember those from before?
END is a pointer
to the end of the
sector, which is SEC plus two
thousand forty-eight.
Take the first byte of
KEY (that's byte zero), perform
exclusive OR with
byte eighty-four of
SEC. Treating the result as
an integer, take
OR of that with two
hundred fifty-six. Store the
result in t1.
Take the next byte (which
is byte one) of KEY, perform
exclusive OR with
the next byte of SEC
(byte eighty-five, right?); store the
result in t2.
Take bytes two through five
of KEY and take exclusive
OR of these with their
counterparts abroad,
bytes eighty-six through eighty-nine
of our sector SEC.
Store this in t3.
(It will fit because it is
four bytes, like t3.)
I must quote myself
because we're going to do
some things once again:
(Above, in the first
part, we talked about t3:)
"Take its three low bits
(you can get them by
ANDing t3 with seven);
store this in t4.
Double t3, add
eight, subtract t4; store the
result in t3."
(Now increment SEC
by one hundred twenty-eight!)
"Make t5 zero."
Now start a loop, and
do these things as long as SEC
doesn't equal END:
Use t2 for an
index into Table Two:
find a byte b1.
Use t1 for an
index into Table Three:
find a byte b2.
Take exclusive OR
of b1 with b2 and
store this in t4.
Shift t1 right by
a single bit (like halving);
store this in t2.
Take the low bit of
t1 (so, AND it with one),
shift it left eight bits,
then take exclusive
OR of that with t4; store
this back in t1.
(The step that's coming
up is _slightly_ different from
the original.)
Use t4 for an
index into Table Five:
find a byte and store
it back in t4.
Shift t3 right by three bits,
take exclusive OR
of this with t3,
shift this right by one bit, and
take exclusive OR
of this with t3,
shift this right by eight bits, and
take exclusive OR
of this with t3,
shift this right by five bits, and
(No exclusive OR!
Orange you glad I
didn't say banana?) take
the low byte (by AND
with two hundred and
fifty-five); now store this
into t6. Phew!
Shift t3 left eight
bits, take OR with t6, and
store this in t3.
Use t6 for an
index into Table Four:
find a byte and store
it in t6. Add
t6, t5, t4; store
the sum in t5.
(Again, here's a change
from the original steps:
please don't get confused.)
In Table One use
the byte SEC points to as an
index, get a byte
there, take exclusive
OR of that byte with the low
byte of t5; store
the result where SEC
points, and increment SEC by
one. This is all that
has changed in these steps.
And we're almost done! Now shift
t5 right eight bits;
store the result in
t5 again. That is the
last step in the loop.
Now I want a drink
(mnemonics in crypto poems
are great!); exercise
from singing so long
makes me thirst for a glass of
soda, slice of pie.
For this is the end
of the decryption process;
you can now go home.
But wait! I hear a
voice entreating me to stay:
"O, the Tables tell!"
Alas, I have not
as yet declared to you the
CSS Tables.
This is a major
issue, in that I don't know
what these tables mean:
our noble guide has
told us in outline what they
are for, or something
of their structure. But
to me, a humble poet
of mathematics,
they are opaque, they
are certain combinations
of ancient, noble
Number. Their inner
logic, aitia, telos,
still unknown to me.
Herein a clear free
speech question: would courts see fit
to muzzle me, then,
from speaking numbers,
technical data, which I
did not make and more
cannot memorize,
cannot explain in detail,
cannot understand?
I have these numbers.
They have meaning, this is clear:
else why suppress them?
I wish to speak or
let the Muse announce through me
Tables of Numbers.
Professor Moglen!
Help defend my right to share
these numbers with you!
You called the right to
speak with PGP like that
to use Navaho.
Help me then in my
haiku quest to share these bits,
and not be censored.
Preserve my right to
speak here, in this extreme, these
mystery Tables
the products, pieces
of technique, which but a very
few will understand.
Mary Jo White, the
United States Attorney
for S.D.N.Y.,
your logic erodes
any meaningful power
Internet speakers
would retain against
state censorship. Do you care?
Have you any shame?
Fight, brave amici,
with effective, functional
argumentation.
I'll try to help by
singing these octets, until
court orders forbid.
(Sad to say, I have
removed hyphens in numbers:
poetic license.)
Table Zero is:
Five, zero, one, two, three, four,
oh, one, two, three, four.
Table One is long:
two to the eighth power bytes.
Ready? Here they are:
Fifty one; then one
hundred fifteen; fifty nine;
thirty eight; ninety
nine; thirty five; one
hundred seven; one hundred
eighteen; sixty two;
one hundred twenty
six; fifty four; forty three;
one hundred ten; then
forty six; then one
hundred two; one hundred and
twenty three; then two
hundred eleven;
one hundred forty seven;
two hundred nineteen;
six; sixty seven;
three; seventy five; then one
hundred fifty; two
hundred twenty two;
one hundred fifty eight; two
hundred fourteen; then
eleven; and then
seventy eight; fourteen; then
seventy; then one
hundred fifty five;
eighty seven; twenty three;
ninety five; then one
hundred thirty; one
hundred ninety nine; then one
hundred thirty five;
two hundred seven;
eighteen; ninety; twenty six;
eighty two; then one
hundred forty three;
two hundred two; one hundred
thirty eight; then one
hundred ninety four;
thirty one; two hundred and
seventeen; then one
hundred fifty three;
two hundred nine; zero; then
seventy three; nine;
sixty five; then one
hundred forty four; then two
hundred sixteen; one
hundred fifty two;
two hundred eight; one; and then
seventy two; eight;
sixty four; then one
hundred forty five; sixty
one; one hundred and
twenty five; fifty
three; thirty six; one hundred
nine; forty five; one
hundred one; then one
hundred sixteen; sixty; one
hundred twenty four;
fifty two; thirty
seven; one hundred eight; then
forty four; then one
hundred; one hundred
seventeen; two hundred and
twenty one; then one
hundred and fifty
seven; two hundred thirteen;
four; seventy plus
seven; thirteen; then
sixty nine; one hundred and
forty eight; then two
hundred twenty; one
hundred fifty six; then two
hundred twelve; five; then
seventy six; twelve;
sixty eight; one hundred and
forty nine; eighty
nine; twenty five; then
eighty one; one hundred and
twenty eight; then two
hundred one; then one
hundred thirty seven; one
hundred ninety three;
sixteen; eighty eight;
twenty four; eighty; then one
hundred twenty nine;
two hundred; then one
hundred thirty six; then one
hundred ninety two;
seventeen; then two
hundred fifteen; one hundred
fifty one; then two
hundred twenty three;
two; seventy one; seven;
seventy nine; one
hundred forty six;
two hundred eighteen; then one
hundred fifty four;
two hundred ten; then
fifteen; seventy four; ten;
sixty six; then one
hundred fifty nine;
eighty three; nineteen; ninety
one; one hundred and
thirty four; then one
hundred ninety five; then one
hundred thirty one;
two hundred three; then
twenty two; ninety four; then
thirty; eighty six;
one hundred thirty
nine; two hundred six; then one
hundred forty two;
one hundred ninety
eight; twenty seven; then one
hundred seventy
nine; two hundred and
forty three; one hundred and
eighty seven; one
hundred sixty six;
two hundred twenty seven;
one hundred sixty
three; two hundred and
thirty five; two hundred and
forty six; then one
hundred ninety; two
hundred fifty four; then one
hundred eighty two;
then one hundred and
seventy one; two hundred
thirty eight; then one
hundred seventy
four; two hundred thirty; two
hundred fifty one;
fifty five; then one
hundred nineteen; sixty three;
thirty four; then one
hundred three; thirty
nine; one hundred eleven;
one hundred fourteen;
fifty eight; then one
hundred twenty two; fifty;
forty seven; one
hundred six; forty
two; ninety eight; one hundred
twenty seven; one
hundred eighty five;
two hundred forty nine; one
hundred seventy
seven; one hundred
sixty; two hundred thirty
three; one hundred and
sixty nine; then two
hundred twenty five; then two
hundred forty; one
hundred eighty four;
two hundred forty eight; one
hundred seventy
six; one hundred and
sixty one; two hundred and
thirty two; then one
hundred sixty eight;
two hundred twenty four; two
hundred forty one;
ninety three; twenty
nine; eighty five; one hundred
thirty two; then two
hundred five; then one
hundred forty one; then one
hundred and ninety
seven; twenty; then
ninety two; twenty eight; then
eighty four; then one
hundred thirty three;
two hundred four; one hundred
forty; one hundred
ninety six; twenty
one; one hundred eighty nine;
two hundred fifty
three; one hundred and
eighty one; one hundred and
sixty four; then two
hundred and thirty
seven; then one hundred and
seventy three; two
hundred twenty nine;
two hundred forty four; one
hundred eighty eight;
two hundred fifty
two; one hundred eighty; one
hundred sixty five;
two hundred thirty
six; one hundred seventy
two; two hundred and
twenty eight; then two
hundred forty five; fifty
seven; one hundred
twenty one; forty
nine; thirty two; one hundred
five; forty one; then
ninety seven; one
hundred twelve; fifty six; one
hundred twenty; then
forty eight; thirty
three; one hundred four; forty;
ninety six; then one
hundred thirteen; one
hundred eighty three; then two
hundred and forty
seven; one hundred
ninety one; one hundred and
sixty two; then two
hundred thirty one;
one hundred sixty seven;
two hundred thirty
nine; two hundred and
forty two; one hundred and
eighty six; then two
hundred fifty; one
hundred seventy eight; one
hundred seventy
five; two hundred and
thirty four; one hundred and
seventy; then two
hundred twenty six;
two hundred fifty five.
That's the whole Table.
Just when you thought it
was safe, here is Table Two,
which has the same length:
Zero; one; two; three;
four; five; six; seven; nine; eight;
eleven; ten; then
thirteen; twelve; fifteen;
fourteen; eighteen; nineteen; then
sixteen; seventeen;
twenty two; twenty
three; twenty; twenty one; then
twenty seven; then
twenty six; twenty
five; twenty four; thirty one;
thirty; twenty nine;
twenty eight; thirty
six; thirty seven; thirty
eight; thirty nine; then
thirty two; thirty
three; thirty four; thirty five;
forty five; forty
four; forty seven;
forty six; forty one; then
forty; forty three;
forty two; fifty
four; fifty five; fifty two;
fifty three; fifty;
fifty one; forty
eight; forty nine; sixty three;
sixty two; sixty
one; sixty; fifty
nine; fifty eight; fifty plus
seven; fifty six;
seventy three; then
seventy two; seventy
five; seventy four;
seventy seven;
seventy six; seventy
nine; seventy eight;
sixty four; sixty
five; sixty six; sixty plus
seven; sixty eight;
sixty nine; and then
seventy; seventy one;
ninety one; ninety;
eighty nine; eighty
eight; ninety five; ninety four;
ninety three; ninety
two; eighty two; then
eighty three; eighty; eighty
one; eighty six; then
eighty seven; then
eighty four; eighty five; one
hundred nine; then one
hundred eight; then one
hundred eleven; then one
hundred ten; then one
hundred five; then one
hundred four; one hundred and
seven; one hundred
six; one hundred; one
hundred one; one hundred two;
one hundred three; then
ninety six; ninety
seven; ninety eight; ninety
nine; one hundred and
twenty seven; one
hundred twenty six; then one
hundred twenty five;
one hundred twenty
four; one hundred twenty three;
one hundred twenty
two; one hundred and
twenty one; one hundred and
twenty; one hundred
eighteen; one hundred
nineteen; one hundred sixteen;
then one hundred and
seventeen; then one
hundred fourteen; one hundred
fifteen; one hundred
twelve; one hundred and
thirteen; one hundred forty
six; one hundred and
forty seven; one
hundred forty four; then one
hundred forty five;
one hundred fifty;
one hundred fifty one; one
hundred forty eight;
one hundred forty
nine; one hundred fifty five;
one hundred fifty
four; one hundred and
fifty three; one hundred and
fifty two; then one
hundred fifty nine;
one hundred fifty eight; one
hundred and fifty
seven; one hundred
fifty six; one hundred and
twenty eight; then one
hundred twenty nine;
one hundred thirty; then one
hundred thirty one;
one hundred thirty
two; one hundred thirty three;
one hundred thirty
four; one hundred and
thirty five; one hundred and
thirty seven; one
hundred thirty six;
one hundred thirty nine; one
hundred thirty eight;
one hundred forty
one; one hundred forty; one
hundred forty three;
one hundred forty
two; one hundred eighty two;
one hundred eighty
three; one hundred and
eighty; one hundred eighty
one; one hundred and
seventy eight; one
hundred seventy nine; one
hundred seventy
six; one hundred and
seventy seven; then one
hundred ninety one;
one hundred ninety;
one hundred eighty nine; one
hundred eighty eight;
one hundred eighty
seven; one hundred eighty
six; one hundred and
eighty five; then one
hundred eighty four; then one
hundred sixty four;
one hundred sixty
five; one hundred sixty six;
one hundred sixty
seven; one hundred
sixty; one hundred sixty
one; one hundred and
sixty two; then one
hundred sixty three; then one
hundred seventy
three; one hundred and
seventy two; one hundred
seventy five; one
hundred seventy
four; one hundred sixty nine;
one hundred sixty
eight; one hundred and
seventy one; one hundred
seventy; then two
hundred nineteen; two
hundred eighteen; two hundred
seventeen; then two
hundred sixteen; two
hundred twenty three; then two
hundred twenty two;
two hundred twenty
one; two hundred twenty; two
hundred ten; then two
hundred eleven;
two hundred eight; two hundred
nine; two hundred and
fourteen; two hundred
fifteen; two hundred twelve; two
hundred thirteen; two
hundred one; then two
hundred; two hundred three; two
hundred two; then two
hundred five; then two
hundred four; two hundred and
seven; two hundred
six; one hundred and
ninety two; one hundred and
ninety three; then one
hundred ninety four;
one hundred ninety five; one
hundred ninety six;
one hundred ninety
seven; one hundred ninety
eight; one hundred and
ninety nine; then two
hundred fifty five; then two
hundred fifty four;
two hundred fifty
three; two hundred fifty two;
two hundred fifty
one; two hundred and
fifty; two hundred forty
nine; two hundred and
forty eight; then two
hundred forty six; then two
hundred and forty
seven; two hundred
forty four; two hundred and
forty five; then two
hundred forty two;
two hundred forty three; two
hundred forty; two
hundred forty one;
two hundred thirty seven;
two hundred thirty
six; two hundred and
thirty nine; two hundred and
thirty eight; then two
hundred thirty three;
two hundred thirty two; two
hundred thirty five;
two hundred thirty
four; two hundred twenty eight;
two hundred twenty
nine; two hundred and
thirty; two hundred thirty
one; two hundred and
twenty four; then two
hundred twenty five; then two
hundred twenty six;
two hundred twenty
seven. That's the end of the
Table Two listing.
Table Three repeats
itself sixty-four times with
this eight-byte sequence:
Zero, thirty six,
seventy three, one hundred
nine, one hundred and
forty six, then one
hundred eighty two, and then
two hundred nineteen,
and last of all, two
to the eighth, less one (or two
hundred fifty five).
Dr. Touretzky
has a more concise account
of what Table Four
is for, and where it
comes from; but for now, I think
I will just list it:
Zero; one hundred
twenty eight; sixty four; one
hundred ninety two;
thirty two; then one
hundred sixty; ninety six;
two hundred twenty
four; sixteen; then one
hundred forty four; eighty;
two hundred eight; then
forty eight; then one
hundred seventy six; one
hundred twelve; then two
hundred forty; eight;
one hundred thirty six; then
seventy two; two
hundred; forty; one
hundred sixty eight; then one
hundred four; then two
hundred thirty two;
twenty four; one hundred and
fifty two; eighty
eight; two hundred and
sixteen; fifty six; then one
hundred eighty four;
one hundred twenty;
two hundred forty eight; four;
one hundred thirty
two; sixty eight; one
hundred ninety six; thirty
six; one hundred and
sixty four; then one
hundred; two hundred twenty
eight; twenty; then one
hundred forty eight;
eighty four; two hundred twelve;
fifty two; then one
hundred eighty; one
hundred sixteen; two hundred
forty four; twelve; one
hundred forty; then
seventy six; two hundred
four; forty four; one
hundred seventy
two; one hundred eight; then two
hundred thirty six;
twenty eight; then one
hundred fifty six; ninety
two; two hundred and
twenty; sixty; one
hundred eighty eight; then one
hundred twenty four;
two hundred fifty
two; two; one hundred thirty;
sixty six; then one
hundred ninety four;
thirty four; one hundred and
sixty two; ninety
eight; two hundred and
twenty six; eighteen; then one
hundred forty six;
eighty two; then two
hundred ten; fifty; then one
hundred seventy
eight; one hundred and
fourteen; two hundred forty
two; ten; one hundred
thirty eight; and then
seventy four; two hundred
two; forty two; one
hundred seventy;
one hundred six; two hundred
thirty four; twenty
six; one hundred and
fifty four; ninety; then two
hundred eighteen; then
fifty eight; then one
hundred eighty six; then one
hundred twenty two;
two hundred fifty;
six; one hundred thirty four;
seventy; then one
hundred ninety eight;
thirty eight; one hundred and
sixty six; then one
hundred two; then two
hundred thirty; twenty two;
one hundred fifty;
eighty six; then two
hundred fourteen; fifty four;
one hundred eighty
two; one hundred and
eighteen; two hundred forty
six; fourteen; then one
hundred forty two;
seventy eight; two hundred
six; forty six; one
hundred seventy
four; one hundred ten; then two
hundred thirty eight;
thirty; one hundred
fifty eight; ninety four; two
hundred twenty two;
sixty two; then one
hundred ninety; one hundred
twenty six; then two
hundred fifty four;
one; one hundred twenty nine;
sixty five; then one
hundred ninety three;
thirty three; one hundred and
sixty one; ninety
seven; two hundred
twenty five; seventeen; one
hundred forty five;
eighty one; then two
hundred nine; forty nine; one
hundred seventy
seven; one hundred
thirteen; two hundred forty
one; nine; one hundred
thirty seven; then
seventy three; two hundred
one; forty one; one
hundred sixty nine;
one hundred five; two hundred
thirty three; twenty
five; one hundred and
fifty three; eighty nine; two
hundred seventeen;
fifty seven; one
hundred eighty five; then one
hundred twenty one;
two hundred forty
nine; five; one hundred thirty
three; sixty nine; one
hundred and ninety
seven; thirty seven; one
hundred sixty five;
one hundred one; two
hundred twenty nine; twenty
one; one hundred and
forty nine; eighty
five; two hundred thirteen; then
fifty three; then one
hundred eighty one;
one hundred seventeen; two
hundred forty five;
thirteen; one hundred
forty one; seventy plus
seven; two hundred
five; forty five; one
hundred seventy three; one
hundred nine; then two
hundred and thirty
seven; twenty nine; then one
hundred and fifty
seven; ninety three;
two hundred twenty one; then
sixty one; then one
hundred eighty nine;
one hundred twenty five; two
hundred fifty three;
three; one hundred and
thirty one; sixty seven;
one hundred ninety
five; thirty five; one
hundred sixty three; ninety
nine; two hundred and
twenty seven; then
nineteen; one hundred forty
seven; eighty three;
then two hundred and
eleven; fifty one; one
hundred seventy
nine; one hundred and
fifteen; two hundred forty
three; eleven; one
hundred thirty nine;
seventy five; two hundred
three; forty three; one
hundred seventy
one; one hundred seven; two
hundred thirty five;
twenty seven; one
hundred fifty five; ninety
one; two hundred and
nineteen; fifty nine;
one hundred eighty seven;
one hundred twenty
three; two hundred and
fifty one; seven; then one
hundred thirty five;
seventy one; one
hundred ninety nine; thirty
nine; one hundred and
sixty seven; one
hundred three; two hundred and
thirty one; twenty
three; one hundred and
fifty one; eighty seven;
two hundred fifteen;
fifty five; then one
hundred eighty three; then one
hundred nineteen; two
hundred and forty
seven; fifteen; one hundred
forty three; and then
seventy nine; two
hundred seven; forty plus
seven; one hundred
seventy five; one
hundred eleven; then two
hundred thirty nine;
thirty one; then one
hundred fifty nine; ninety
five; two hundred and
twenty three; sixty
three; one hundred ninety one;
one hundred twenty
seven; two hundred
fifty five. And that's the end
of the fourth Table.
(You'll get Table Five
if you flip each bit in the
Table Four, supra.)
Have mercy on me,
Lord, and lesser judges, and
on Jon Johansen.
Man, this blog hysteria is pathetic. That key has been known for months, and now you're getting your panties into a bunch over it?
PS: They'll be changing it, if they haven't already. All it will do is decrypt old HD-DVDs. If you can get the volume ID for them.
Ok, looks like this whole thing is just spillover of digg drama.
Can we please keep that kind of thing somewhere else where people care about it, such as on digg?
>>19
Bla, bla, known plaintext attack, etc, known attack vectors, fuck up compatibility with a lot of players, tl;dr.
There's no compatibility to fuck up, AACS is designed exactly with this kind of thing in mind. At least the original plan called for revoking all software player keys every six months, no matter if they had been compromised or not. I am not sure if they are doing that yet, but that's what it was designed to do.
And it's very easy to make attacks like the ones used to find this key much, much harder. You can obviously never make them impossible, but assuming that if you could do it once, you can do it forever, is highly naïve.
>>22
Hardware player keys, say the xbox drives one. Revoke and piss off a lot of people, especially early adopters, and watch your format die.
And anyways, yes you can. http://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html sounds very plausible to me.
Computer drives and hardware players are different things in AACS. Hardware players have "individual" keys that can be revoked (up to a point, at least).
Computer drives interface with software players through a complex cryptographic scheme, but computer drives do indeed have a single key across the product line. It can be revoked, but that's as you say unlikely to happen.
Now, the current attacks use this part of the protocol. To decrypt a disc, I understand that you need two things: The processing key, and the Volume ID. The attack referred to in >>23 gives you the Volume ID. However, it requires soldering, making it entirely useless for pretty much everyone. The best it can give you is that someone else does it and gets Volume IDs for the discs you have, and posts them on the internet, but with enough discs around that won't be feasible.
You still also need the processing key. That's what >>1 contains, but this key can and will be changed easily. I believe that it could theoretically be different for every single disc, and that the only reason current discs use the same one is only convenience.
In summary: There's still a long way left before you can play your HD-DVDs in VLC. This has merely been the initial battles of a long war.
So basically this is old news in the tech sector and only created a hubbub once some idiot bloggers learned of it long after the fact?
>>24
Then again, someone could (and probably will) just figure out the keys for his disk, rip the HD-DVD and put that up for download via whatever peer-to-peer system seems appropriate (Lawsuits never stopped anyone anyways).
All of this hassle really does make piracy look like the better choice...
Pretty much. Also because it caused Digg drama.
Oh, no argument there. Piracy has been more convenient than legitimate buying for some time now in a number of fields, and copy-protection never stopped a dedicated pirate.
A lot of these arguments tend to run into the "But this is not about PIRACY! It's about playing discs in OPEN-SOURCE PLAYERS!" line, and as it stands right now, AACS can most likely be broken by pirates but not by open-source players for the average user.
>>27
You seem to know a lot about this, so maybe you can tell me if I understood it...
Confirm/Deny/Furthermore?
To my knowledge, that is about it. My knowledge is far from perfect, though, because AACS is a very complex system. For instance, there is a whole separate system for hardware players to get the volume unique key.
I am for instance not sure if it is feasible or not to use different processing keys for every title, which would seem an obvious way of strengthening the system.
03 FF 1A DE 4D B3 3F F2 2D 2D D2 80 64 44 31 C6