Prototipe Teknik Mutual Authentication Untuk Digital Rights Management

Authors

  • Yoso Adi Setyoko Insitut Teknologi Telkom Purwokerto
  • Anggi Zafia Institut Teknologi Telkom Purwokerto
  • Aulia Desy Nur Utomo Institut Teknologi Telkom Purwokerto

DOI:

https://doi.org/10.54367/jtiust.v7i1.1912

Keywords:

Prototype, mutual authentication, DRM, encryption, protocol engineering

Abstract

Our research is the adoption of mutual authentication techniques on smart cards for Digital Rights Management (DRM) which is applied using network protocol engineering. We adopted the protocol engineering from the mutual authentication technique owned by the Mifare Desfire smart card. The tests carried out in our research are testing the security aspects of authentication and data confidentiality. Our authentication test is done by changing the client and server master keys that determine the success of authentication. Meanwhile, data confidentiality testing is carried out by tapping data sent from the client to the DRM server. When authentication by the client and server fails, the software is declared invalid and vice versa. The result of our research is the successful implementation of the adoption of the smart card's mutual authentication technique for application protection in DRM including authentication and encryption functions.

References

M. D. E. S. Fire and C. Stanford, “Mifare ® DES Fire,” no. April, 2009.

S. Goswami, S. Misra, and M. Mukesh, “A Replay Attack Resilient System for PKI Based Authentication in Challenge-Response Mode for Online Application,” Proc. - 2014 3rd Int. Conf. Eco-Friendly Comput. Commun. Syst. ICECCS 2014, pp. 144–148, 2015, doi: 10.1109/Eco-friendly.2014.104.

R. Engelberger, M. Fetscherin, and D. Günnewig, “Digital rights management,” Wirtschaftsinformatik, vol. 47, no. 2, pp. 141–147, 2005, doi: 10.1007/BF03250987.

Ç. Polat, K. Yildiz, U. C. Çabuk, and G. Dalkiliç, “Providing key diversity for symmetric encryption in Ad-Hoc wireless networks,” 2nd Int. Conf. Comput. Sci. Eng. UBMK 2017, pp. 298–303, 2017, doi: 10.1109/UBMK.2017.8093393.

NXP, “Symmetric key diversifications,” no. March, pp. 1–23, 2010, [Online]. Available: http://www.nxp.com/documents/application_note/AN10922.pdf.

B. Rothke, “A look at the Advanced Encryption Standard (AES),” Inf. Secur. Manag. Handbook, Sixth Ed., pp. 1151–1158, 2007, doi: 10.1201/9781439833032.ch89.

A. Biryukov and C. Cannière, “Data encryption standard (DES),” Encycl. Cryptogr. Secur., vol. 3, pp. 129–135, 2006, doi: 10.1007/0-387-23483-7_94.

Dr. Peter Klein, “Secure Access Module (SAM),” CardLogic.com, 2011. https://www.cardlogix.com/glossary/sam-card-secure-access-module-secure-application-module/.

F. Sibarani, “Kartu SAM, Master App yang Dilakukan dengan Sarana & Keadaan Apa Adanya,” 2022, [Online]. Available: https://www.aktualdetik.com/berita/7117/kartu-sam-master-app-yang-dilakukan-dengan-sarana--keadaan-apa-adanya.html.

R. Chandramouli and P. Lee, “Infrastructure standards for smart ID card deployment,” IEEE Secur. Priv., vol. 5, no. 2, pp. 92–96, 2007, doi: 10.1109/MSP.2007.34.

Downloads

Published

2022-05-31

Issue

Section

Artikel