View Single Post
Old 03-27-2008, 12:20 PM   #41
llasram
Reticulator of Tharn
llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.llasram ought to be getting tired of karma fortunes by now.
 
llasram's Avatar
 
Posts: 618
Karma: 400000
Join Date: Jan 2007
Location: EST
Device: Sony PRS-505
Quote:
Originally Posted by Taylor514ce View Post
@Ilasram: Publishers never give you the key. You never give them the key. There is a public encryption key and a private decryption key. That's the very heart of the system. You've misunderstood the system at it's fundamental level.
Hmm. I think my use of the word "give" distracted you and/or you have some misapprehension about the nature of asymmetric cryptography. Asymmetric cryptography gives you: algorithm + pubkey + plaintext = ciphertext; and algorithm + privkey + ciphertext = plaintext. If you're only looking at the decryption side -- considering only the actions of the DRM-stripping pirate -- the fact that the decryption key is the private half of a public/private key pair is of no consequence: you still have the inevitable fact that algorithm + key + ciphertext = plaintext for even authorized programs to be able to derive the plaintext from the ciphertext. If your system allows one to read a book on any device just by providing your public key and the protected book, it would allow a DRM-stripper to produce an unecrypted copy of the book with just by providing it the public key and the protected book -- exactly as things stand today.

I do agree(?) that a less restrictive system would provide less incentive for piracy, but a system based on asymmetric cryptography would make it no more difficult to produce a systemic break for the sufficiently motivated.
llasram is offline   Reply With Quote