DocumentCode :
1960886
Title :
Forensic methods for detection of deniable encryption in mobile networks
Author :
Irwin, Angela ; Hunt, Ray
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Univ. of Canterbury, Christchurch, New Zealand
fYear :
2009
fDate :
23-26 Aug. 2009
Firstpage :
169
Lastpage :
174
Abstract :
Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible plaintexts, depending on the key used or otherwise makes it impossible to prove the existence of the real message without the proper encryption key. This allows the sender to have plausible deniability if compelled to give up their encryption key. Deniable file systems allow for the creation of an encrypted volume on a hard disk and a second, hidden deniable file system created inside with access by a second password. The objective of this research is to establish whether or not evidence of a hidden volume can be found in deniable encryption tools using conventional forensic analysis. A testbed is developed using open source deniable encryption software and forensics tools with the objective of proving or disproving this claim.
Keywords :
cryptography; mobile computing; public domain software; encrypted data; forensic methods; hidden deniable file system; mobile networks encryption; open source deniable encryption software; Authentication; Cryptography; Data security; File systems; Forensics; Hard disks; Open source software; Software testing; Software tools; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Computers and Signal Processing, 2009. PacRim 2009. IEEE Pacific Rim Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4244-4560-8
Electronic_ISBN :
978-1-4244-4561-5
Type :
conf
DOI :
10.1109/PACRIM.2009.5291379
Filename :
5291379
Link To Document :
بازگشت