High-bandwidth Digital Content Protection

HDCPHDCP master key releaseHigh-Bandwidth Digital Content Protection (HDCP)encryptedprotected content
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio & video content as it travels across connections.wikipedia
137 Related Articles

DisplayPort

SlimPorteDPDisplay Stream Compression
Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI).
It also includes HDCP in addition to DisplayPort Content Protection (DPCP).

HDMI

High-Definition Multimedia InterfaceHDMI 1.4HDMI 2.0
Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI).
Digital Content Protection, LLC provides HDCP (which was developed by Intel) for HDMI.

Key selection vector

KSV
For each set of values, a special private key called a KSV (Key Selection Vector) is created.
It is considered a confidential set of keys used in Restricted Authentication process of the HDCP.

Digital Visual Interface

DVIDVI-IDVI-D
Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI).
Some DVD players, HDTV sets, and video projectors have DVI connectors that transmit an encrypted signal for copy protection using the High-bandwidth Digital Content Protection (HDCP) protocol.

Gigabit Video Interface

GVIF
Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI).
It is compatible with the HDCP encryption system.

Blom's scheme

During authentication, the parties exchange their KSVs under a procedure called Blom's scheme.
Blom's scheme is currently used by the HDCP (Version 1.x only) copy protection scheme to generate shared keys for high-definition content sources and receivers, such as HD DVD players and high-definition televisions.

Intel

Intel CorporationIntel Corp.Intel Inside
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio & video content as it travels across connections.
Intel also developed High-Bandwidth Digital Content Protection (HDCP) to prevent access of digital audio and video content as it travels across connections.

Broadcast flag

The FCC's Broadcast flag regulations, which were struck down by the United States Court of Appeals for the District of Columbia Circuit, would have required DRM technologies on all digital outputs from HDTV signal demodulators.
Flagged content must be output only to "protected outputs" (such as DVI and HDMI ports with HDCP encryption), or in degraded form through analog outputs or digital outputs with visual resolution of 720x480 pixels (EDTV) or less.

Unified Display Interface

UDI
Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI).
UDI provides higher bandwidth than its predecessors (up to 16 Gbit/s in its first version, compared to 4.9 Gbit/s for HDMI 1.0) and incorporates a form of digital rights management known as HDCP.

Analog hole

analog loopholepointing a video camera at the TV
In practical terms, the impact of the crack has been described as "the digital equivalent of pointing a video camera at the TV", and of limited importance for consumers because the encryption of high-definition discs has been attacked directly, with the loss of interactive features like menus.

AACS encryption key controversy

AACS encryption key09 F91
In practical terms, the impact of the crack has been described as "the digital equivalent of pointing a video camera at the TV", and of limited importance for consumers because the encryption of high-definition discs has been attacked directly, with the loss of interactive features like menus.

Digital rights management

DRMDRM-freedigital restrictions management
The FCC's Broadcast flag regulations, which were struck down by the United States Court of Appeals for the District of Columbia Circuit, would have required DRM technologies on all digital outputs from HDTV signal demodulators.
HDCP is an attempt to plug the analog hole, although as of 2009, it was largely ineffective.

Niels Ferguson

Ferguson, NielsFerguson
Around the same time, Niels Ferguson independently claimed to have broken the HDCP scheme, but he did not publish his research, citing legal concerns arising from the controversial Digital Millennium Copyright Act.
In 2001, he claimed to have broken the HDCP system that is incorporated into HD DVD and Blu-ray Discs players, similar to the DVDs Content Scramble System, but has not published his research, citing the Digital Millennium Copyright Act of 1998, which would make such publication illegal.

HD DVD

HD-DVDhigh definition3× DVD
AACS has also been circumvented by SlySoft with their program AnyDVD HD, which allows users to watch HD DVD movies on non-HDCP-compliant PC hardware.

HD ready

HD ready 1080pHD-readyHDTV
On January 19, 2005, the European Information, Communications, and Consumer Electronics Technology Industry Associations (EICTA) announced that HDCP is a required component of the European "HD ready" label.

Mobile High-Definition Link

MHLsuperMHL MHL 1
It has several aspects in common with HDMI, such as the ability to carry uncompressed HDCP encrypted high-definition video, eight-channel surround sound, and control remote devices with Consumer Electronics Control (CEC).

Blu-ray

Blu-ray DiscBDBlu-ray 3D
It is currently unclear whether such devices would remain working if the HDCP licensing body issued key-revocation lists, which may be installed via new media (e.g. newer Blu-ray Discs) played-back by another device (e.g. a Blu-ray Disc player) connected to it.
Blu-ray equipment is required to implement the High-bandwidth Digital Content Protection (HDCP) system to encrypt the data sent by players to rendering devices through physical connections.

Display lag

control latencyinput lag
Additional issues arise when interactive media (i.e. video games) suffer from control latency, because it requires additional processing for encoding/decoding.
Possible culprits are the processing overhead of HDCP, Digital Rights Management (DRM), and also DSP techniques employed to reduce the effects of ghosting – and the cause may vary depending on the model of display.

Copy protection

anti-piracycopy-protectedcopy protected
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio & video content as it travels across connections.

Compact disc

CDCDsCD single
For example, the device cannot be designed to copy; it must "frustrate attempts to defeat the content protection requirements"; it must not transmit high definition protected video to non-HDCP receivers; and DVD-Audio works can be played only at CD-audio quality by non-HDCP digital audio outputs (analog audio outputs have no quality limits).

Reverse engineering

reverse engineeredreverse engineerreverse-engineered
Intel has confirmed that the crack is real, and believes the master key was reverse engineered rather than leaked.

Signedness

unsignedsignedunsigned integer
Each device adds its own secret keys together (using unsigned addition modulo 2 56 ) according to a KSV received from another device.

Modular arithmetic

modulomodcongruent
Each device adds its own secret keys together (using unsigned addition modulo 2 56 ) according to a KSV received from another device.

Stream cipher

stream cypherstream ciphersstream
Encryption is done by a stream cipher.