
A man-in-the-middle attack on HDCP-secured video links is demonstrated. The attack is implemented on an embedded Linux platform, with the help of a Spartan-6 FPGA, and is capable of operating real-time on HD video links. It utilizes the HDCP master key to derive the corresponding private keys of the video source and sink through observation and computation upon the exchanged public keys. The man-in-the-middle then genlocks its raster and cipher state to the incoming video stream, enabling it to do pixel by pixel swapping of encrypted data. Since the link does no CRC or hash verification of the data, one is able to forge video using this method.
Bunnie’s latest is so cool, and so out there – watch the whole thing and check out the slides.
8 thoughts on ““Implementation of MITM Attack on HDCP-Secured Links””
Comments are closed.
You guys are going to catch a little hell for hosting this post. (so…) Good for you-all! Well done! More like this. Makers include those wishing to recover some of their freedom to control their own purchases. Thank you, folks.
What he ^ said. And good on Bunnie.
Wow, marvelous blog structure! How lengthy have you ever been running a blog for?
you made blogging look easy. The entire glance
of your web site is wonderful, let alone the content!
Awesome things here. I am very happy to peer your article.
Thank you so much and I am taking a look ahead to contact you.
Will you please drop me a e-mail?
Hi, i believe that i saw you visited my site thus i came to go back the want?.I am trying to in finding issues to enhance my site!I
suppose its ok to use a few of your ideas!!