Workshop Description
DRM systems protect content through a multi-layered trust chain that depends heavily on asymmetric cryptography. Widevine licence requests use RSA-2048 for server certificate authentication. PlayReady employs ECC-256 for device certificates. HDCP relies on RSA for authentication across HDMI links. AACS uses ECDSA in the device key infrastructure. Each of these is vulnerable to Shor's algorithm on a sufficiently capable quantum computer. The DRM challenge is that the trust chain spans multiple independent parties (studios, distributors, platform operators, device manufacturers) who must coordinate migration.
This workshop maps the complete cryptographic dependency surface across the DRM ecosystem: content key encryption and distribution (licence servers), device attestation and certificate chains (TEE infrastructure), transport encryption (CENC, CBCS), watermarking integrity, and the standards bodies that govern the specifications (W3C EME, DASH-IF, MovieLabs). For each dependency, we identify the specific asymmetric algorithm at risk, assess the quantum threat timeline based on published estimates, and evaluate the NIST PQC replacement path (FIPS 203 ML-KEM for key exchange, FIPS 204 ML-DSA for signatures). Participants leave with a DRM-specific cryptographic inventory and a coordinated migration strategy that accounts for the multi-party governance reality.
What participants cover
- Widevine, PlayReady, and FairPlay cryptographic dependency mapping: RSA and ECC usage in licence delivery, device certificates, and content key hierarchies
- HDCP and AACS quantum vulnerability assessment: RSA authentication in HDMI links and ECDSA in disc/device key infrastructure
- TEE attestation under PQC: Trusted Execution Environment certificate chains (ARM TrustZone, Intel SGX) and their dependence on classical signatures
- W3C Encrypted Media Extensions (EME) and DASH-IF security specification analysis: where PQC changes propagate through the standards stack
- Content key hierarchy migration: transitioning from RSA-wrapped content keys to ML-KEM without breaking backward compatibility with deployed device populations
- Multi-party coordination strategy: aligning studio, distributor, platform, and device manufacturer migration timelines across the DRM trust chain