Tech Insider					     Technology and Trends


	      Linux Video & DVD Project Mailing List Archives

From bon@elektron.ikp.physik.tu-darmstadt.de Fri, 8 Oct 1999 18:31:31 +0200 (MEST)
Date: Fri, 8 Oct 1999 18:31:31 +0200 (MEST)
From: Uwe Bonnes bon@elektron.ikp.physik.tu-darmstadt.de
Subject: [Livid-dev] Brute force key recovery

Hallo,

has there been any action to set up a brute force key recovery scheme
for the DVD keys like it has been done for normal message encrytion?

Bye

Uwe Bonnes bon@elektron.ikp.physik.tu-darmstadt.de

Institut fuer Kernphysik Schlossgartenstrasse 9 64289 Darmstadt
--------- Tel. 06151 162516 -------- Fax. 06151 164321 ----------

From aholtzma@ess4.engr.UVic.CA Fri, 8 Oct 1999 13:21:00 -0700
Date: Fri, 8 Oct 1999 13:21:00 -0700
From: Aaron Holtzman aholtzma@ess4.engr.UVic.CA
Subject: [Livid-dev] Brute force key recovery

Since the source hasn't been released, there probably isn't much
point to this yet. Why not wait a little on this and see what shakes
out :)

cheers,
aaron

It would seem that Uwe Bonnes (bon@elektron.ikp.physik.tu-darmstadt.de) said:
> Hallo,
> 
> has there been any action to set up a brute force key recovery scheme
> for the DVD keys like it has been done for normal message encrytion?
> 
> Bye
> 
> Uwe Bonnes bon@elektron.ikp.physik.tu-darmstadt.de
> 
> Institut fuer Kernphysik Schlossgartenstrasse 9 64289 Darmstadt
> --------- Tel. 06151 162516 -------- Fax. 06151 164321 ----------
> 
> 
> _______________________________________________
> Livid-dev maillist - Livid-dev@livid.on.openprojects.net
> http://livid.on.openprojects.net/mailman/listinfo/livid-dev

From nobody@replay.com Fri, 8 Oct 1999 22:53:00 +0200 (CEST)
Date: Fri, 8 Oct 1999 22:53:00 +0200 (CEST)
From: Anonymous nobody@replay.com
Subject: [Livid-dev] (no subject)

Don't worry about the player keys... It won't be a problem.
The computational effort to find new ones is minimal [15 hrs for all 400 
keys on a dual processor machine, assuming you know the title key. Another 
30 hrs on the same machine if you don't].

Other interesting things:
Many of the 400 keys are the same.

Players can and do have > 1 key.

Brute forcing the player keys on a disk gives you a set of potential 
keys... But some of them won't work in general [they just happen have the 
same mapping for the particular encrypted text].

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO v IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or
research.

Electronic mail:			       WorldWideWeb:
   tech-insider@outlook.com			  http://tech-insider.org/