Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory

Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory

Štefan Balogh
ISBN13: 9781466658080|ISBN10: 1466658088|EISBN13: 9781466658097
DOI: 10.4018/978-1-4666-5808-0.ch016
Cite Chapter Cite Chapter

MLA

Balogh, Štefan. "Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory." Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, IGI Global, 2014, pp. 381-396. https://doi.org/10.4018/978-1-4666-5808-0.ch016

APA

Balogh, Š. (2014). Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory. In S. Sadkhan Al Maliky & N. Abbas (Eds.), Multidisciplinary Perspectives in Cryptology and Information Security (pp. 381-396). IGI Global. https://doi.org/10.4018/978-1-4666-5808-0.ch016

Chicago

Balogh, Štefan. "Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory." In Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, 381-396. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5808-0.ch016

Export Reference

Mendeley
Favorite

Abstract

The increasing portability of computing devices combined with frequent reports of privacy breaches and identity theft has thrust data encryption into the public attention. While encryption can help mitigate the threat of unintentional data exposure, it is equally capable of hiding evidence of criminal malfeasance. The increasing accessibility and usability of strong encryption solutions present new challenges for digital forensic investigators. Understanding forensic analysis as a multidisciplinary field that searches evidence of crime, the authors focus their topic on particularity of cross-disciplinary issues arising in this area: Forensic analysis uses cryptology, information technology and mathematics in extracting encryption keys from memory. The chapter highlights the virtues of volatile memory analysis by demonstrating how key material and passphrases can be extracted from memory and reconstructed to facilitate the analysis of encrypted data. The authors show current methods for identifying encryption keys in memory and discuss possible defeating techniques and cryptosystem implementation strategies that could be used to avoid the key extraction.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.