. "Using one of above-described cryptography techniques, it is possible to realize a system in which encrypted contents can be decrypted only by authorized users. [0011] In such a content distribution system, encrypted contents are provided to users via a network or via a storage such as a DVD or a CD, and content keys used to decrypt the encrypted contents are provided only to authorized users." . . . .