Determining compatibility between blu-ray player and discs
#26
Re: Determining compatibility between blu-ray player and discs
Doing some more number crunching on this data, I wanted to see whether this subset/difference pyramid had one or more master passwords. This involves understanding what the "uv table" is in the MKB_RO.inf file.
I can say definitively that this subset/difference tree is basically a pyramids within pyramids structure. The u-coordinate states what the initial starting location is in the "superpyramid" which a "master key" (probably randomly chosen) is assigned to a "mini pyramid". The subsequent nodes inside this "mini pyramid" anchored by the initial u-coordinate, are calculated from this initial "master key".
So if a hacker cracks the "master key" of a particular mini-pyramid, all the accs folks have to do is change the initial starting location "u-coordinate" to another spot in the superpyramid and assign a totally different new "master key" for this new minipyramid. (There are over 4 billion possible spots within this superpyramid to start a new mini-pyramid).
Even if the 128-bit AES algorithm is cracked, there is still no easy way to crack the entire superpyramid if all the "master keys" are randomly generated.
Naor-Naor-Lotspiech must have thought very thoroughly about this structure, when they first designed it.
I can say definitively that this subset/difference tree is basically a pyramids within pyramids structure. The u-coordinate states what the initial starting location is in the "superpyramid" which a "master key" (probably randomly chosen) is assigned to a "mini pyramid". The subsequent nodes inside this "mini pyramid" anchored by the initial u-coordinate, are calculated from this initial "master key".
So if a hacker cracks the "master key" of a particular mini-pyramid, all the accs folks have to do is change the initial starting location "u-coordinate" to another spot in the superpyramid and assign a totally different new "master key" for this new minipyramid. (There are over 4 billion possible spots within this superpyramid to start a new mini-pyramid).
Even if the 128-bit AES algorithm is cracked, there is still no easy way to crack the entire superpyramid if all the "master keys" are randomly generated.
Naor-Naor-Lotspiech must have thought very thoroughly about this structure, when they first designed it.
In any case to the OP, try taking the BD player off the BD Live mode. This is how the players are updated automatically and checked. You might get lucky if you notice it's ON, and you set it to OFF. If there are ANY other network connections to the net...turn them off..even unplug the thing from the net if you have to. All else fails, as suggested, get another player. I ditched my POS Oppo a while back because it wouldn't play discs, and knew at that point it's a game, and buying a lower-priced player, trashable in a few years or so, is the best way to go if things get ridiculous.
#27
DVD Talk Ultimate Edition
Re: Determining compatibility between blu-ray player and discs
If one traces through the provenance of the leaked/pilfered keys, it is obvious the widely known ones were from hacking the Sony Playstation 3. Especially when somebody was able to get Linux running on a PS3, it became a easier exercise to find various aacs encryption keys.
If one looks through the subset/difference matrix inside each new MKB_RO.inf file and compare differences with previous MKB_RO.inf versions, it is obvious that the source of most stolen keys were from PS3 hacking.
#28
DVD Talk Hero
Re: Determining compatibility between blu-ray player and discs
Doing some more number crunching on this data, I wanted to see whether this subset/difference pyramid had one or more master passwords. This involves understanding what the "uv table" is in the MKB_RO.inf file.
I can say definitively that this subset/difference tree is basically a pyramids within pyramids structure. The u-coordinate states what the initial starting location is in the "superpyramid" which a "master key" (probably randomly chosen) is assigned to a "mini pyramid". The subsequent nodes inside this "mini pyramid" anchored by the initial u-coordinate, are calculated from this initial "master key".
So if a hacker cracks the "master key" of a particular mini-pyramid, all the accs folks have to do is change the initial starting location "u-coordinate" to another spot in the superpyramid and assign a totally different new "master key" for this new minipyramid. (There are over 4 billion possible spots within this superpyramid to start a new mini-pyramid).
Even if the 128-bit AES algorithm is cracked, there is still no easy way to crack the entire superpyramid if all the "master keys" are randomly generated.
Naor-Naor-Lotspiech must have thought very thoroughly about this structure, when they first designed it.
I can say definitively that this subset/difference tree is basically a pyramids within pyramids structure. The u-coordinate states what the initial starting location is in the "superpyramid" which a "master key" (probably randomly chosen) is assigned to a "mini pyramid". The subsequent nodes inside this "mini pyramid" anchored by the initial u-coordinate, are calculated from this initial "master key".
So if a hacker cracks the "master key" of a particular mini-pyramid, all the accs folks have to do is change the initial starting location "u-coordinate" to another spot in the superpyramid and assign a totally different new "master key" for this new minipyramid. (There are over 4 billion possible spots within this superpyramid to start a new mini-pyramid).
Even if the 128-bit AES algorithm is cracked, there is still no easy way to crack the entire superpyramid if all the "master keys" are randomly generated.
Naor-Naor-Lotspiech must have thought very thoroughly about this structure, when they first designed it.
#29
DVD Talk Ultimate Edition
Re: Determining compatibility between blu-ray player and discs
The part of AACS which would in principle be vulnerable to cracking via quantum computing, would be the Host Certificate and Drive Certificate. Both are using the Elliptic Curve Digital Signature Algorithm as outlined on page 10 in the "Introduction and Common Cryptographic Elements Book Rev 0.953" pdf public document on the aacs web site.
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
ECDSA is vulnerable to anything which can factor large numbers into its prime number factor constituents.
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
https://en.wikipedia.org/wiki/Shor%27s_algorithm
#30
DVD Talk Ultimate Edition
Re: Determining compatibility between blu-ray player and discs
The part of AACS which would in principle be vulnerable to cracking via quantum computing, would be the Host Certificate and Drive Certificate. Both are using the Elliptic Curve Digital Signature Algorithm as outlined on page 10 in the "Introduction and Common Cryptographic Elements Book Rev 0.953" pdf public document on the aacs web site.
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
ECDSA is vulnerable to anything which can factor large numbers into its prime number factor constituents.
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
https://en.wikipedia.org/wiki/Shor%27s_algorithm
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
ECDSA is vulnerable to anything which can factor large numbers into its prime number factor constituents.
https://en.wikipedia.org/wiki/Ellipt...ture_Algorithm
https://en.wikipedia.org/wiki/Shor%27s_algorithm
#31
DVD Talk Ultimate Edition
Re: Determining compatibility between blu-ray player and discs
All it will take is something which can factor large numbers into a product of its prime numbers really fast.
For the matter, the entire internet would be vulnerable in the same way where public key encryption systems which use the difficulty of factoring something into its large prime number factors is the main point of security.
For the matter, the entire internet would be vulnerable in the same way where public key encryption systems which use the difficulty of factoring something into its large prime number factors is the main point of security.
#32
DVD Talk Hero
Re: Determining compatibility between blu-ray player and discs
All it will take is something which can factor large numbers into a product of its prime numbers really fast.
For the matter, the entire internet would be vulnerable in the same way where public key encryption systems which use the difficulty of factoring something into its large prime number factors is the main point of security.
For the matter, the entire internet would be vulnerable in the same way where public key encryption systems which use the difficulty of factoring something into its large prime number factors is the main point of security.




