Quote:
Originally Posted by Taylor514ce
@Ilasram: Publishers never give you the key. You never give them the key. There is a public encryption key and a private decryption key. That's the very heart of the system. You've misunderstood the system at it's fundamental level.
|
Hmm. I think my use of the word "give" distracted you and/or you have some misapprehension about the nature of asymmetric cryptography. Asymmetric cryptography gives you: algorithm + pubkey + plaintext = ciphertext; and algorithm + privkey + ciphertext = plaintext. If you're only looking at the decryption side -- considering only the actions of the DRM-stripping pirate -- the fact that the decryption key is the private half of a public/private key pair is of no consequence: you still have the inevitable fact that algorithm + key + ciphertext = plaintext for even authorized programs to be able to derive the plaintext from the ciphertext. If your system allows one to read a book on any device just by providing your public key and the protected book, it would allow a DRM-stripper to produce an unecrypted copy of the book with just by providing it the public key and the protected book -- exactly as things stand today.
I do agree(?) that a less restrictive system would provide less incentive for piracy, but a system based on asymmetric cryptography would make it no more difficult to produce a systemic break for the sufficiently motivated.