Apparently HDCP has been cracked. Now, Blu-ray content protection has been cracked before. At least, it's been cracked such that you can rip and store the files to hard drive if, you know, you're a glutton for punishment and have enough hard disc space to make this practical. Our thought has been that picking up a Blu-ray Disc jukebox like Sony's BDP-CX7000ES ($750) or the Pioneer DV-F727 ($600) makes a lot more sense, even though it's not as nifty as having a smooth digital interface for all your movies. But "researchers" at the Secure Hardware Group of Ruhr University of Bochum (RUB) in Germany claim to have cracked Intel's HDCP using hardware.
So how does this differ from the cracked master key - accomplished back in 2010? Well, the cracked master key allows the generation of new keys that will work with players, etc - thus removing the issue of "revoked" keys from inhibiting the copying of Blu-ray and other protected content. The trouble is, the presence of this master key wasn't terribly significant since there would need to be hardware created in order for it to have any practical use in circumventing copy protection on any large scale.
Brute-force attacks can be made less effective by obfuscating the data to be encoded making it more difficult for an attacker to recognize when the code has been cracked or by making the attacker do more work to test each guess. One of the measures of the strength of an encryption system is how long it would theoretically take an attacker to mount a successful brute-force attack against it.
An underlying assumption of a brute-force attack is that the complete key space was used to generate keys, something that relies on an effective random number generator, and that there are no defects in the algorithm or its implementation. For example, a number of systems that were originally thought to be impossible to crack by brute force have nevertheless been cracked because the key space to search through was found to be much smaller than originally thought, because of a lack of entropy in their pseudorandom number generators. These include Netscape's implementation of SSL (famously cracked by Ian Goldberg and David Wagner in 1995) and a Debian/Ubuntu edition of OpenSSL discovered in 2008 to be flawed. A similar lack of implemented entropy led to the breaking of Enigma's code.
The objective of Bernstein is to "Make RSA Great Again!", and he hopes to rely on Moore's Law on make 1TB seem like 1MB is today, and that 3.166TB of RAM will be like 16GB of memory. He also thinks that many of the proposed methods for quantum computing robust crypto might be cracked, and that RSA is at least better than QKD (Quantum Key Distribution).
The benefits of using a cracked version of Paragon Hard Disk Manager include the fact that it is free of charge, and that it does not contain any malware. Furthermore, by downloading and using a cracked version of the program, users can access all of the features and functions offered by the full version. 2b1af7f3a8