Forced Encryption Solutions
Price
Free (open access)
Volume
30
Pages
7
Published
2004
Size
222 kb
Paper DOI
10.2495/NL040261
Copyright
WIT Press
Author(s)
H.B. Wolfe
Abstract
This paper is intended to introduce the reader to various techniques and tools that can be used to force a solution of encrypted data without the use of cryptanalysis. The relevance of these techniques becomes apparent when attempting to view potential evidence files that have been encrypted and the suspect refuses to cooperate by providing their keys. Keywords: electronic evidence, surveillance, forensics, chain of evidence, evidentiary copy, evidence acquisition, encryption. 1 Introduction Investigation and capture of electronic evidence inevitably includes encrypted data. In the first instance, the Court can and usually will direct the accused to provide their keys. If this directive is successful then no further action is necessary and the techniques outlined in this paper will not come into play. However, when keys are not forthcoming the investigator is faced with the difficult proble
Keywords