Welcome to Doom9's Forum, THE in-place to be for everyone interested in DVD conversion. Before you start posting please read the forum rules. By posting to this forum you agree to abide by the rules. |
20th March 2009, 20:09 | #1 | Link |
Registered User
Join Date: Jan 2007
Location: Internet
Posts: 378
|
MKBv9 and MKBv10 Processing Keys found
Again it's up to me to present you the latest Processing Keys. This time i had even less work to do than last time because two members who wish to remain anonymous have both sent me these keys.
A big thank you to you two guys and an even bigger thank you to TAKU who has found these keys. I was told that it was also TAKU who has found the previous MKBv4 and MKBv6-MKBv8 Processing Keys. Keep up the great work, now that DRM is vanishing from music, let it vanish from video too . I have verified the MKBv9 key myself, i don't have a MKBv10 disc to verify the other key, but others report this key is valid too. So here they are: Code:
MKBv9: C87294CE84F9CCEB5984B547EEC18D66 MKBv10: 452F6E403CDF10714E41DFAA257D313F |
20th March 2009, 21:40 | #3 | Link |
Ubuntu French Roast
Join Date: Apr 2006
Location: Bordeaux, France
Posts: 191
|
MKBv10 key works too.
__________________
Code:
Copy Protection: A clever method of preventing incompetent pirates from stealing software and legitimate customers from using it. |
21st March 2009, 00:48 | #4 | Link |
Registered User
Join Date: Nov 2007
Posts: 80
|
Millions of dollars in research, trade secrets, royalties ... Completly useless against one smart cow
Great work!
__________________
< War is Peace; Freedom is Slavery; Ignorance is Strength!> ^__^ (oo)\_______ (__)\.......)\/\ . . ||----w | . . || . . || |
23rd March 2009, 14:34 | #10 | Link |
Registered User
Join Date: Jan 2007
Posts: 274
|
I do (want to know how they were found). The only reason I come here is because I'm interested in the details of the ongoing DRM battle. I fully understand that some methods are kept secret because revealing them would make them useless, but where that doesn't apply, I'd like to hear about the "how."
|
26th March 2009, 19:49 | #12 | Link | |
Registered User
Join Date: Apr 2005
Posts: 12
|
"determined" is probably more important than "smart". it's not like some mathematical prodigy/genius actually cracked AACS or AES. lot's of software guys are smart enough to pull keys from RAM, but most aren't motivated to spend the time and energy.
Quote:
|
|
26th March 2009, 20:15 | #13 | Link | |
Registered User
Join Date: Jan 2007
Posts: 274
|
Quote:
For background: Each processing key corresponds to a single node on a single "floor" of arnezami's parking garage analogy in the "Understanding AACS" sticky thread. Each floor corresponds to the "u" of the AACS uv-number or the "S" in an S-D subset difference set (choose your preferred notation). The node on the floor that corresponds to the processing key is the "v" or "D." All devices on the tree of that floor that are below the "v" or "D" are unable to calculate this processing key, so knowing the uv or S-D for the processing key tells us which devices were revoked. Is there a list of each known node/processing key and it's matching uv/S-D number somewhere? I know early on there were some graphic tools for looking at this, but i haven't heard them discussed much recently. Thanks. |
|
27th March 2009, 02:08 | #14 | Link |
Registered User
Join Date: Mar 2009
Posts: 10
|
Hi ridesideways,
what kind of "determination" are we talking about ? Lots of equipment, time and knowledge, some kind of "insider info" or would it be just let's say Blu Ray drive in a PC with Windows, Debugger and valid PDVD 7.3 to play and debug ? Are there some concepts available or all previously found keys have been discovered using completely different method(s) ? dr.fix |
27th March 2009, 15:11 | #15 | Link | |
Registered User
Join Date: Jan 2007
Posts: 274
|
Quote:
The first successful attack was Muslix's memory dump approach based on known-plaintext in the encrypted data. The players were hardened, but this approach still produced good results when multiple snapshots of memory were taken. Another successful approach was based on USB sniffing. I don't know anything about the successful recent attacks. |
|
28th March 2009, 13:34 | #16 | Link |
Registered User
Join Date: Nov 2007
Posts: 80
|
AFAIK the most succesfull attack was the memory dumping, by searching the memory while playing or by crashing the program when loading, I think arnezami's key was found on a crashed memory dump while PDVD was loading so TAKU might be loading-crashing&dumping a software player and looking for the previously known keys then repeat the process with a new disc.
__________________
< War is Peace; Freedom is Slavery; Ignorance is Strength!> ^__^ (oo)\_______ (__)\.......)\/\ . . ||----w | . . || . . || |
|
|