Abstract
Stream To uses a tamper resistant hardware token to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested Pay-TV technology to the Internet. We present two prototype implementations with a performance assessment, showing that the system is both effective and efficient.
Chapter PDF
Similar content being viewed by others
Reference
Buchheit, M. and Kgler, R. (2004). Secure music content standard — content protection with codemeter. In 4th Open Workshop of Interactive Music Network Multimedia MUSICNETWORK, page Paper 10.
Chong, C. N., Peng, Z., and Hartel, P. H. (2003). Secure audit logging with tamper-resistant hardware. In Gritzalis, D., di Vimercati, S. D. C, Samarati, P., and Katsikas, S. K., editors, 18th IFIP International Information Security Conference (IFIPSEC), volume 250 of IFIP Conference Proceedings, pages 73–84. Kluwer Academic Publishers.
Chong, C. N., Ren, B., Doumen, J., Etalle, S., Hartel, P. H., and Corin, R. (2004). License protection with a tamper-resistant token. In Lim, C. H. and Yung, M., editors, 5 th Workshop on Information Security Applications (WISA 2004), volume 3325 of LNCS, pages 224–238. Springer-Verlag.
Eskicioglu, A. M. and Delp, E. J. (2001). An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication, 16:681–699.
Fiat, A. and Naor, M. (1994). Broadcast encryption. In Advances in Cryptology (CRYPTO’03 Proceedings, volume 773 of LNCS, pages 480–491. Springer-Verlag.
Greene, T. C. (2001). MS digital rights management scheme cracked. TheRegister.co.uk.
Guillou, L. C. (1984). Smart cards and conditional access. In Advances in Cryptology EUROCRYPT 84), volume 209 of LNCS, pages 480–485. Springer-Verlag.
Holankar, D. and Stamp, M. (2004). Secure streaming media and digital rights management. In Proceedings of the 2004 Hawaii International Conference on Computer Science, pages 85–96. ACM Press.
Jain, P. C, Joshi, S., and Mitra, V. (2002). Conditional access in digital television. In The 8 th National Conference Communications (NCC) 2002, Technical Session paper 30.
Judge, P. and Ammar, M. (2003). The benefits and challenges of providing content protection in peer-to-peer systems. In Int. Workshop for Technology, Economy, Social and Legal spects of Virtual Goods, paper 12, Ilmenau. Germany.
Kelsey, J. and Schneier, B. (1999). Authenticating secure tokens using slow memory access (extended abstract). In USENIXWorkshop on Smart Card Technology, pages 101–106. USENIX Press.
Kingpin (2002). A practical introduction to the dallas semiconductor ibutton. Technical report,@Stake, Inc.
Kravitz, D. W. and Goldschlag, D. M. (1999). Conditional access concepts and principles. In Proceedings of the 3rd International Conference on Financial Cryptography, volume 1648 of LNCS, pages 158–172. Springer-Verlag.
Lipmaa, H. and Rogaway, P. (2000). Comments to NIST concerning AES-modes of operations: CTR-mode encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Electronic Proceedings.
Macq, B. M. and Quisquater, J.-J (1995). Cryptology for digital tv broadcasting. Proceedings of IEEE, 83(6):944–957.
WIBU (2003). CodeMeter Developer’s Guide. WIBU-SYSTMES AG, Rueppurrer Str.53-54 76137 Karlsruhe, Germany, 1.0 edition.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Cheng, J., Chong, C.N., Doumen, J.M., Etalle, S., Hartel, P.H., Nikolaus, S. (2005). Streamto: Streaming Content Using a Tamper-Resistant Token. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_40
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_40
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)