On the Reliability of Cryptopometry

On the Reliability of Cryptopometry

Thomas Martin, Laurence O’Toole, Andrew Jones
Copyright: © 2013 |Volume: 5 |Issue: 1 |Pages: 12
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466631168|DOI: 10.4018/jdcf.2013010102
Cite Article Cite Article

MLA

Martin, Thomas, et al. "On the Reliability of Cryptopometry." IJDCF vol.5, no.1 2013: pp.27-38. http://doi.org/10.4018/jdcf.2013010102

APA

Martin, T., O’Toole, L., & Jones, A. (2013). On the Reliability of Cryptopometry. International Journal of Digital Crime and Forensics (IJDCF), 5(1), 27-38. http://doi.org/10.4018/jdcf.2013010102

Chicago

Martin, Thomas, Laurence O’Toole, and Andrew Jones. "On the Reliability of Cryptopometry," International Journal of Digital Crime and Forensics (IJDCF) 5, no.1: 27-38. http://doi.org/10.4018/jdcf.2013010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Forensics investigators encounter many challenges when it comes to digital evidence: the constantly changing technology that may store evidence, the vast amounts of data involved, and the increasing use of encryption. Cryptography, when used correctly, can prevent any useful information from being retrieved and is encountered in the use of communication protocols, whole-disk encryption, password managers, and so forth. There are some techniques that can assist the investigator when encountering encrypted material. Simple password-based systems can be brute-forced, and live memory capture can obtain key material directly. It has been suggested that the ciphertext length can be used to conclusively determine the plaintext (McGrath, Gladyshev, & Carthy, 2010). In this paper, the authors devise an experiment to test this claim. Based on the results, they argue that there are flaws with this approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.