Impact of Encryption on Digital Forensics

来源 :中国科技博览 | 被引量 : 0次 | 上传用户:yutou1888
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  ABSTRACT
  Encryption is now a widely used method to prevent unauthorized access to personal information. Due to the difficulty in obtaining the decryption key, it also makes digital forensic investigation more complex, which means the digital evidence may not be recovered as easily as before or even unrecoverable. This survey paper will review several kinds of encryption methods in different papers, such as Full Disk Encryption(FDE), Virtual Disk Encryption(VDE),File Encryption and another two-step encryption. Besides, this paper will look into the effects these methods have on digital forensics.
  1.Introduction
  * FDE
  “Full disk encryption is to encrypt the whole hard drive or the entirety of a particular volume.”[1]This can be done using software such as BitLocker or hardware which will encrypt the disk completely. By doing so, a forensic examiner would encounter a full disk encryption interface prior to the machine booting. The investigators cannot get access to any data if they cannot provide the decryption key even though they create a duplicate of the hard drive. If the user’s password is long and random enough, it is impossible to recover any data. The key point here is how to acquire the decryption key. According to Sarah Lowman’s paper, some possible methods are concluded as follows.
  One way is to acquire the key from the suspect. Although it is now the law in the UK that any encryption keys must be given to the police, this is not the case in other countries like US. Besides, the punishment for not surrendering the keys may be far less severe than the potential punishment for any crime committed.[2]So if the suspect refuses to give their key or pleads plausible deniability, the investigators will have to try some other methods.
  As the author states, keeping the key available is of crucial importance since if the key is lost, all the user’s data goes with it. Therefore, due to the accessibility and convenience issues, it may make it much easier for the forensic investigators to find the key. Other methods of finding the key includes using Password Recovery Toolkit(PRTK) and using the optional password recovery mode on some FDEs. Besides, in corporate environments the system administrator may be able to provide recovery keys(Casey & Stellatos, 2008).
  For the forensic examiners, it is also important for them to find out if any disks are using full disk encryption when they seize a computer, as it impacts the way the computer should be dealt with. If the machine is switched on, the investigators should make a live copy of the disk in case the key is never retrieved, otherwise the data may be lost when the machine is powered down.[1][2]   * VDE
  Virtual disk encryption tool is used to generate virtual disk image by introducing some encryption methods. It has the same feature with FDE that it can be used as anti-forensic tool because forensic investigators cannot get access to the content of disk if they have no idea about the key or passphrase. As a result, it is crucial to collect as much evidence as possible in a live state. However, forensic examiners need to judge whether a system has used VDE tool or not. Within the paper of Sungsu Lim et al., they propose some methods to verify the usage of VDE tools in a system by checking the artifacts generated during Installation ,Runtime, and Deletion procedures. By doing that, investigators can decide what action to perform during live forensics.[3]
  * File encryption
  File encryption is used to encrypt files within an operating system rather than entire disks(FDE,VDE). With regards to this methods, the key point still lies in how to acquire keys during forensic investigations. Since investigators can gain access to the operation system, then many clues can be utilized to crack the password. However, for FDE, a password is needed to boot the system, which means nothing within the system can be used to collect evidence except doing live forensics. To acquire keys, there are several different methods to do according to the conclusion of Sarah Lowman. For convenience, many users may make their password short and quick to type which can be a break-point for the investigators. And software like Password Recovery Toolkit can be fed in with running strings on the hard drive image to try and crack a password. Sometimes if the key length is not long enough, keys can be brute forced. In addition to these methods, vulnerability can be exploited in a system to get keys.
  There are a few disadvantages of making use of this encryption method. Since plaintext have to exist in the system before files are encrypted, fragments of files which are in unencrypted forms can be found in the system. Apart from this, suspects may careless enough to leave unencrypted files related to encrypted ones on the system.[2]
  * Two-step Encryption
  This is a new anti-forensic tool proposed by Sang Su Lee et al. General idea is to encrypt a secret file twice, with the first time by some standard algorithms like AES and the second time by XOR the content of file with any selected files in the system. Since it is difficult to find exact files which are selected by users to perform the second time encryption, it will be relatively hard for forensic examiners to recover the plaintext. One can use his own offset values or a rule to derive the files to increase the complexity in forensic analysis.[4]   2.Analysis
  FDE and VDE methods are both used to encrypt disks. These two methods release the mounted disk when a system is shutdown and are remained as an encrypted state. And it is relatively hard for forensic investigators to obtain the decryption key, so it is much more complex in a digital forensic investigation compared with other two methods. Although several ways are proposed by the paper authors to acquire the keys, it is still not that easy. The accessibility and convenience issues can be avoided by setting a long and random password if one really want to fight against the forensic investigators. Also, the power of law only works in some specific countries and there is no unified standard for this. Some tools like Password Recovery Toolkit(PRTK) mentioned by Sarah may work for the recovery of encryption keys.
  Since the investigation is difficult to progress if the computer is shutdown with the data encrypted, investigators may need to perform live forensics and collect as many evidences as possible. When the system is on, many ways are provided to trace the use of a FED or VDE tool according to Sangjin Lee’s paper. However, the verifying process here may still bring some changes to the system which will impact the digital evidence, especially the volatile data. Although we can document the changes as suggested, it is still a difficult process to track all the changes so as to affect the credibility. Nevertheless, it is the only feasible solution to obtain evidences due to the complexity of FED and VDE methods, what investigators can do is just to change the data as little as possible.
  As for file encryption, it is not integrated to the operating system, thus many traces will be left outside the encrypted files. Therefore, it causes relatively smaller trouble for the investigators. And thus it would not be the main future direction of research in this field .The new anti-forensic tool proposed by Sang Su Lee and his partners can also be classified to the category of file encryption. Although the authors argue that the second round of the encryption has a high complexity by virtue of the irregularity in selecting files and offset values, traces can still be found to help recover the plaintext since we have access to the memory and the whole system. It might be a hint for the investigators to cope with this ‘new’ tool.
  For digital forensics, the most efficient way to acquire the key is to obtain it from the suspect. Some governments have already created new laws to compel people to give up their keys or provide unencrypted data. It is really helpful for the forensic investigations. However, due to the disunity of laws, criminals still have ways to escape punishment or comply a less severe punishment in some countries. It would be an important issue for the government to amend the laws to adjust to this new kind of crime.
  3.Conclusion
  All kinds of mentioned encryption methods have certain impacts on digital forensics. However, due to the feature integrating encryption into the operating system, FDE and VDE tools can cause more trouble for forensic examiners. And thus more efforts should be put into detection of these software and strategies how to discover keys or obtain plaintext.
  4.References
  [1].Casey, E., Stellatos, G. J., “The Impact of Full Disk Encryption on Digital Forensics”, ACM, Newyork, 2008.
其他文献
[摘 要]为找出螺栓断裂的原因,以防止类似事故再次发生,对断裂螺栓的化学成分、显微组织、断口微观形貌及腐蚀产物进行了分析,制定预防措施。  [关键词]阀门 电镜分析 预防措施及建议  中图分类号:D565 文献标识码:A 文章编号:1009-914X(2014)41-0364-01  前言  该阀门型号为“Z41H-64,Dg15”,材质为不锈钢。该批阀门共有238只,自2004年10月投用至今,
期刊
[摘 要]对单元式玻璃幕墙的质量进行控制直接关系到建筑物玻璃幕墙的美观和安全性。本文对单元式玻璃幕墙的性能进行了简单分析,接着单元式玻璃幕墙质量控制以及安装验收两方面考慮,提出了有效保证玻璃幕墙质量和美观的方法。  [关键词]单元式玻璃幕墙 质量控制 安装技术  中图分类号:D291 文献标识码:A 文章编号:1009-914X(2014)41-0366-01  玻璃幕墙是一种由支承结构体系和玻璃
期刊
[摘 要]巷道是煤矿建设的基础组成部分,巷道的施工可以分成掘进和支护两个步骤。实现煤矿高产高效的主要途径是提高煤矿巷道掘进速度,而我国煤矿开采逐步现代化、机械化、规模化的发展趋势给支护技术在巷道掘进中的应用提出了更高的要求。  [关键词]煤矿;掘进;支护  中图分类号:D291 文献标识码:A 文章编号:1009-914X(2014)41-0379-01  一、煤矿掘进过程中的支护现状  对于煤矿
期刊
[摘 要]绩效考核是人力资源管理的重要部分,它作为一种有效的企业管理手段,是实现企业战略过程很好的联系纽带,其在评价及激励员工,增强企业活力以及竞争力,促进企业发展等方面,发挥着至关重要的作用,是企业人力资源管理的基础与核心。本文对绩效考核在人力资源中的内容和作用、存在的问题以及优化措施进行了详细的探讨。  [关键词]绩效考核 人力资源 作用  中图分类号:TM711 文献标识码:A 文章编号:1
期刊
[摘 要]由于各种因素的影响,经常发生PDC钻头泥包的现象,导致起钻次数增多,甚至被迫使用牙轮钻头。PDC钻头泥包,严重制约了钻井速度的提高,PDC钻头发生泥包时,切削齿和钻头体上会黏附大量的泥页岩切屑,影响破岩效率,弄清泥包机理是了解泥包影响因素、预防和清除泥包的前提。为此,通过调研,分析近年来国内外PDC钻头泥页岩地层钻进泥包机理、防止和清除泥包等方面的大量文献,从钻井液类型及性能、钻头结构、
期刊
[摘 要]某电厂#5、6锅炉一直以来基于安全性考虑磨煤机运行台数不少于4台,但机组负荷长期低位运行,且入炉煤热值适中、可磨性较高、煤質稳定,磨煤机出力富裕明显,多磨煤机少煤量的运行方式不够合理,具备较大的节能空间。通过优化磨煤机的运行方式,根据机组低负荷和磨煤机的能力投运相应台数的磨煤机,以尽量减少制粉电耗,降低厂用电率。  [关键词]锅炉 磨煤机 可行性 运行方式 控制  中图分类号:TQ533
期刊
[摘 要]我国的地质条件复杂,煤层开采条件优劣不一,断层这种地质结构在我国的采煤工作面中比较常见。因此,给煤炭的开采工作带来了很大的安全隐患。本文首先概述了断层的形成及危害,然后就采煤工作面过断层的方法和措施等技术问题进行了重点阐述。  [关键词]煤矿采煤;断层;方法  中图分类号:TM711 文献标识码:A 文章编号:1009-914X(2014)41-0380-01  引言  煤炭作为重要能源
期刊
中图分类号:D291 文献标识码:A 文章编号:1009-914X(2014)41-0390-01  档案展览是各级档案馆开发利用档案资源、发挥档案馆社会服务功能的有效途径,它能够吸引众多的社会公众走进档案馆,也是各级档案馆近年来开展的重点工作之一。在以往举办的档案展览中,最终产品往往就是展览本身,并没有其他附加产品。随着档案人视野的开阔,工作触角的延伸,各级档案部门对于展览在举办过程中和举办之后
期刊
[摘 要]随着社会经济进一步发展,人们对接收空间信息的需求越来越强烈。测绘信息数据的服务体系是接收空间信息的主要媒介,在最大程度上发掘空间资源、为相关需求人群提供高质量空间信息中发挥着重要作用。因此,要加强测绘信息管理系统的研究,实现管理系统与需求人群之间的良性互补。  [关键词]WebGIS 测绘信息管理系统 理论研究  中图分类号:D291 文献标识码:A 文章编号:1009-914X(201
期刊
[摘 要]3#支点喷嘴组件是精密铸件,零件结构复杂;尺寸精度高;技术条件要求严格;就现普通设备加工无法满足设计要求,针对以上问题,对工艺路线,工艺装备、加工方法进行了一系列的工艺改进,提高了零件加工合格率及试验合格率。  [关键词]工艺方法 工装 改进  中图分类号:TD6 文献标识码:A 文章编号:1009-914X(2014)41-0378-01  1.引言  3#支点喷嘴组件是喷嘴加工工艺中
期刊