CSS employs cryptographic keys with a size of only 40 bits. This makes CSS vulnerable to a
brute-force attack. At the time CSS was introduced, it was forbidden in the United States for manufacturers to
export cryptographic systems employing keys in excess of 40 bits, a key length that had already been shown to be wholly inadequate in the face of increasing computer processing power (see
Data Encryption Standard). Based on the leaked
DeCSS source-code,
Frank A. Stevenson published in November 1999 three exploits that rendered the CSS cipher practically ineffective: • A
correlation attack enables the recovery of a keystream's seed at complexity of 216. • The mangling of disc- and title-keys can be reversed at a complexity of 28. • A disc-key can be recovered from its hash-value at a complexity of 225. The latter exploit recovers a disk-key from its hash-value in less than 18 seconds on a 450 MHz Intel Pentium III. The CSS design was prepared for the leak of a few player-keys. New discs would not contain an encrypted variant for these player-keys in the disc-key-block. However, Stevenson's exploits made it possible to generate all player-keys.
Libdvdcss uses such a list of generated player-keys. There are cases when no title-keys are available. A drive may deny access on region mismatch but still permit reading of the encrypted DVD-Video. Ethan Hawke presented a plain-text prediction for data repetitions in the
MPEG program stream that enables the recovery of title-keys in real-time directly from the encrypted DVD-Video. In
Geeks Bearing Gifts, author
Ted Nelson states "DVD encryption was intentionally made light by the DVD encryption committee, based on arguments in a libertarian book
Computer Lib", a claim cited as originating from personal communication with an
anonymous source; Nelson is the author of
Computer Lib. ==See also==