
On weaknesses of the HDCP authentication and key exchange protocol and its repair
Keywords: Information security; HDCP specification; UKS attack; Impersonation attack; Forward secrecy; Key confirmation