SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Security                                           eBooks




        Cryptographic Duplicate Detection

               For Access Management, Piracy
                    Protection, and More



                                Steven Davis

                                          steve@free2secure.com
Games, iGaming, and Gambling                    +1.650.278.7416
Security                                                 eBooks




        Protocols not Players or Computers


                               That’s all you see
                                     online




                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                      eBooks


                   Traditional Identification &
        Authentication Methods are very weak
                 for verifying actual identities




 •   Name/Password can be shared & compromised
 •   ID/Key can be shared or compromised
 •   “Digital Fingerprints” can be duplicated


                                     steve@free2secure.com
Games, iGaming, and Gambling               +1.650.278.7416
Security                                  eBooks


• Powerful white list of
  good platforms
• Improve association
  of players with
  platforms
• Identifying problem
  platforms
• Can be a very
  powerful technique           Detecting
  to fight server piracy
  / ghost servers
                               Duplicate
• Support legitimate           Identities
  sharing and backups


                                 steve@free2secure.com
Games, iGaming, and Gambling           +1.650.278.7416
Security                                eBooks




    Core Idea
    Why not change identities AND keys at
     every session (or more frequently)?




                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                             eBooks

         Active Identity System - General Flow
                                                                                    tic
                                                                                 sta
   • Initialization                                                         be
                                                                       to
       – Done in a variety of ways                                ve
                                                                ha
       – Identity can even be verified retroactively
                                                             ot
   •   Verify Current Identity/Key Pair                    sn
                                                     doe
   •   Update Identity/Key Pair                    e
   •   Verify Update                            alu
                                         tit yV
   •   Continue Operations            en
                                    Id
   • OPTION - use “rolling update” to operate smoothly
     during identity changes
             • add an “A” or “B” Flag to messages
             • Send “rollover” command message

                                                       steve@free2secure.com
Games, iGaming, and Gambling                                 +1.650.278.7416
Security                                                                   eBooks

                    Server-Push Identity
 Player posts ID to server                            ID(x)
 Server returns Challenge Phrase                      Challenge(IDx))
 Player posts encrypted Challenge Phrase              ID(x),E(Key(x),Challenge(IDx))
 Server validates Response
 Server creates updated ID & Key
 Server sends updated ID & Key encrypted in old key   E(Key(x+1),ID(x+1),SessionID)
 Player decrypts new ID & Key
 Player sends validation message to Server            SessionID,E(Key(x+1),SessionID)


    • Client gets new ID/Key pair from server
    • Server knows underlying identity of client
    • If duplicate made of client info, server can create an “Identity Fork”
      or take other action
    • You know a duplicate has been made, not which copy is a duplicate
    • Can be done with symmetric keys or public (asymmetric) key
      systems

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416
Security                                                                        eBooks

             Collaborative Identity Generation 1
 Player creates new ID(cx+1), Transform of new ID, and Challenge1
 Player creates new DH random z and computes b z mod p
 Player posts Challenge Phrase to server
           ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1)
 Server decrypts Challenge Phrase
 Server creates new ID(sx+1), Transform of new ID, and Challenge2
 Server creates new DH random y and computes b y mod p
 * Server creates new DH key              Key(x+1) = (b z ) y mod p
 Server posts Challenge Phrase to Client
           ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1))
 Client decrypts Challenge Phrase and validates Challenge1


 • Sample using Diffie-Hellman style key generation
 • Could easily be adapted to other public key algorithms


                                                                    steve@free2secure.com
Games, iGaming, and Gambling                                              +1.650.278.7416
Security                                                                         eBooks

             Collaborative Identity Generation 2
 (from previous page) Client decrypts Challenge Phrase and validates Challenge1
 * Client creates new DH key             Key(x+1) = (b z ) y mod p
 Client validates new DH key with received hash
 Client sends new ID(cx+1) to Server with hash of new Key and Challenge2
            ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2)
 Server validates new ID against previously received Transform and validates Key(x+1) hash
 * Server computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Server sends new ID contribution to Client
            ID(x),E(Key(x),ID(sx+1)
 * Client computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Client and sever use new ID(x+1), Key(x+1) pair


 • Active Identity System is really a temporary pairwise identity
   with a remote entity
 • Does not need to be client-server, could be peer-to-peer

                                                                     steve@free2secure.com
Games, iGaming, and Gambling                                               +1.650.278.7416
Security                                                 eBooks

 Active Identity is Part of an Overall Identity &
 Access Management Solution

                             To
                                Str
                                    en
                                 an gth
                                     d O en
                                        nli Pla
                                           ne tfo
                                             Se rm
     •  Digital Fingerprints                    cu i d
                                                  rity en
     •  User Name/Passwords                              tity
     •  Security Tokens
     • IP Address
     • Platform IDs
     • Active ID

                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                                  eBooks


   Fighting Server
   Piracy


  • Client can detect server duplicates as server won’t have
    current identity/key pair
     – Can prevent connection to pirate server
  • Even if real server identity/key database gets
    compromised, clients will rapidly rekey to new
    identity/key pairs
  • Can also be used for traditional computer piracy
    detection system
                                                 steve@free2secure.com
Games, iGaming, and Gambling                           +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
           • Worked on everything from online
             games and satellite TV to Nuclear
             Command and Control and military
             communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”


  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/ .
       – Join me there, ask questions, challenge assumptions, let’s make things
         better.

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

Weitere ähnliche Inhalte

Kürzlich hochgeladen

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Piracy Protection and Online Identity Security with Digital Duplicate Detection

  • 1. Security eBooks Cryptographic Duplicate Detection For Access Management, Piracy Protection, and More Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Protocols not Players or Computers That’s all you see online steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks Traditional Identification & Authentication Methods are very weak for verifying actual identities • Name/Password can be shared & compromised • ID/Key can be shared or compromised • “Digital Fingerprints” can be duplicated steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks • Powerful white list of good platforms • Improve association of players with platforms • Identifying problem platforms • Can be a very powerful technique Detecting to fight server piracy / ghost servers Duplicate • Support legitimate Identities sharing and backups steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks Core Idea Why not change identities AND keys at every session (or more frequently)? steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks Active Identity System - General Flow tic sta • Initialization be to – Done in a variety of ways ve ha – Identity can even be verified retroactively ot • Verify Current Identity/Key Pair sn doe • Update Identity/Key Pair e • Verify Update alu tit yV • Continue Operations en Id • OPTION - use “rolling update” to operate smoothly during identity changes • add an “A” or “B” Flag to messages • Send “rollover” command message steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Server-Push Identity Player posts ID to server ID(x) Server returns Challenge Phrase Challenge(IDx)) Player posts encrypted Challenge Phrase ID(x),E(Key(x),Challenge(IDx)) Server validates Response Server creates updated ID & Key Server sends updated ID & Key encrypted in old key E(Key(x+1),ID(x+1),SessionID) Player decrypts new ID & Key Player sends validation message to Server SessionID,E(Key(x+1),SessionID) • Client gets new ID/Key pair from server • Server knows underlying identity of client • If duplicate made of client info, server can create an “Identity Fork” or take other action • You know a duplicate has been made, not which copy is a duplicate • Can be done with symmetric keys or public (asymmetric) key systems steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Collaborative Identity Generation 1 Player creates new ID(cx+1), Transform of new ID, and Challenge1 Player creates new DH random z and computes b z mod p Player posts Challenge Phrase to server ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1) Server decrypts Challenge Phrase Server creates new ID(sx+1), Transform of new ID, and Challenge2 Server creates new DH random y and computes b y mod p * Server creates new DH key Key(x+1) = (b z ) y mod p Server posts Challenge Phrase to Client ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1)) Client decrypts Challenge Phrase and validates Challenge1 • Sample using Diffie-Hellman style key generation • Could easily be adapted to other public key algorithms steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Collaborative Identity Generation 2 (from previous page) Client decrypts Challenge Phrase and validates Challenge1 * Client creates new DH key Key(x+1) = (b z ) y mod p Client validates new DH key with received hash Client sends new ID(cx+1) to Server with hash of new Key and Challenge2 ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2) Server validates new ID against previously received Transform and validates Key(x+1) hash * Server computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Server sends new ID contribution to Client ID(x),E(Key(x),ID(sx+1) * Client computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Client and sever use new ID(x+1), Key(x+1) pair • Active Identity System is really a temporary pairwise identity with a remote entity • Does not need to be client-server, could be peer-to-peer steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Active Identity is Part of an Overall Identity & Access Management Solution To Str en an gth d O en nli Pla ne tfo Se rm • Digital Fingerprints cu i d rity en • User Name/Passwords tity • Security Tokens • IP Address • Platform IDs • Active ID steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks Fighting Server Piracy • Client can detect server duplicates as server won’t have current identity/key pair – Can prevent connection to pirate server • Even if real server identity/key database gets compromised, clients will rapidly rekey to new identity/key pairs • Can also be used for traditional computer piracy detection system steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 13. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise • Worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ . – Join me there, ask questions, challenge assumptions, let’s make things better. steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Hinweis der Redaktion

  1. http://paintingperceptions.com/videos/the-http://www.paintingperceptions.com/wp-content/uploads/2011/03/monoDamien.jpg http http://images3.wikia.nocookie.net/__cb20061109120654/uncyclopedia/images/1/12/MonaLisa.jpg http://1.bp.blogspot.com/-fnnRDjPhs8I/Ts4LO4RifQI/AAAAAAAACkE/FICafzhG68s/s1600/bin+laden+mona.jpg http://www.freakingnews.com/pictures/21000/Mona-Lisa-Jack-Sparrow--21109.jpg http://www.deviantart.com/download/83657642/Lego_Mona_Lisa_by_Eeveeisgerman.jpg http://www.artyfactory.com/pop_art_portraits/images/mona_lisa/mona_lisa_group_3.jpg http://cloud.kapilsoni.com/2009/11/What-Mona-Lisa-Looks-Like-002.jpg
  2. http://file.cdn.global.netmarble.com/img/Forum/40/2011/10/05/20111005134703.jpg