Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory

Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory

Štefan Balogh (Slovak University of Technology, Slovakia)
DOI: 10.4018/978-1-4666-5808-0.ch016
OnDemand PDF Download:


The increasing portability of computing devices combined with frequent reports of privacy breaches and identity theft has thrust data encryption into the public attention. While encryption can help mitigate the threat of unintentional data exposure, it is equally capable of hiding evidence of criminal malfeasance. The increasing accessibility and usability of strong encryption solutions present new challenges for digital forensic investigators. Understanding forensic analysis as a multidisciplinary field that searches evidence of crime, the authors focus their topic on particularity of cross-disciplinary issues arising in this area: Forensic analysis uses cryptology, information technology and mathematics in extracting encryption keys from memory. The chapter highlights the virtues of volatile memory analysis by demonstrating how key material and passphrases can be extracted from memory and reconstructed to facilitate the analysis of encrypted data. The authors show current methods for identifying encryption keys in memory and discuss possible defeating techniques and cryptosystem implementation strategies that could be used to avoid the key extraction.
Chapter Preview


Currently, many organizations and government institutions have some experience, may be major or minor, of losing sensitive data. In May 2007, the Transportation Security Administration (TSA) lost a hard drive containing approximately 100,000 employee bank account details, while in October 2007 two laptops containing names and social security numbers of almost 4,000 employees were stolen.

In the same year, the government in the United Kingdom reported that two disks with personal information details of 25 million citizens had been lost.2 This forced many institutions to improve their data security procedures by implementing encryption mechanisms to protect their sensitive data.

Nonetheless, encryption is a double-edged sword. On one hand, it protects our sensitive data, on the other it allows criminals to hide data that would convict them of a crime.

Encryption has been used in relation to pedophilia, terrorism, organized crime and espionage (Denning, 1997).

In 2007, an incident happened when US Customs found child pornography on a Canadian citizen and legal US resident Sebastian Boucher's laptop. The laptop was seized as the evidence and he was charged with transporting the pornography across borders. The problem appeared when examiners tried to open the incriminating drive Z and found out that it was a Pretty Good Privacy encrypted container. Although a forensic duplicate of hard drive was created after the shutdown of the notebook, the examiner could not open the encrypted container. Boucher refused to give the password on the grounds that it violated the Fifth Amendment right against self-incrimination.3

The cooperation between the fields of cryptology, information technology, and forensic analysis is necessary in order to be able to obtain the encrypted evidence. In this chapter, we summarize possibilities, which individual fields of the forensic analysis offer to detect relevant information (evidence), and identify encryption keys, respectively. Moreover, we discuss the current state of and future trends in these areas.

Complete Chapter List

Search this Book: