DiscoverChaos Computer Club - 28C3: behind enemy lines (ogg)Implementation of MITM Attack on HDCP-Secured Links (28c3)
Implementation of MITM Attack on HDCP-Secured Links (28c3)

Implementation of MITM Attack on HDCP-Secured Links (28c3)

Update: 2011-12-29
Share

Description

A man-in-the-middle attack on HDCP-secured video links is demonstrated. The attack is implemented on an embedded Linux platform, with the help of a Spartan-6 FPGA, and is capable of operating real-time on HD video links. It utilizes the HDCP master key to derive the corresponding private keys of the video source and sink through observation and computation upon the exchanged public keys. The man-in-the-middle then genlocks its raster and cipher state to the incoming video stream, enabling it to do pixel by pixel swapping of encrypted data. Since the link does no CRC or hash verification of the data, one is able to forge video using this method.

about this event: http://events.ccc.de/congress/2011/Fahrplan/events/4686.en.html
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Implementation of MITM Attack on HDCP-Secured Links (28c3)

Implementation of MITM Attack on HDCP-Secured Links (28c3)

bunnie