Lect 09
Lect 09
Antiforensics
Topics
Encryption
Breaking Encryption
Hiding and Destroying Data
Antiforensics
Medical data
Without
encryption, the Web would be
much less useful
Encryption Defined
11
Asymmetric Cryptography Algorithms
Use two keys that are mathematically related
Data encrypted with one key can be decrypted only with the
other key
Another name for asymmetric key cryptography is public key
cryptography
12
Asymmetric Cryptography
13
Popular Algorithms
Symmetric Encryption
DES, 3DES, AES, Blowfish
Asymmetric Encryption
RSA, ECC, ElGamal
Themost secure algorithms are open-
source
Proprietary,
secret algorithms are almost
always insecure
Keys
16
How Many Bits Do You Need?
How many keys could all the computers on
Earth test in a year?
Pentium 4 processor: 109 cycles per second
One year = 3 x 107 seconds
There are less than 1010 computers on Earth
One per person
109 x 3 x 107 x 1010 = 3 x 1026 calculations
128 bits should be enough (3 x 1038 values)
Unless computers get much faster, or someone
breaks the algorithm
17
Practical Key Lengths
Link Ch 6e
Hiding and Destroying
Data
Data Destruction
Drive Wiping
Darik's Boot and Nuke (DBAN)
Window Washer
Evidence Eliminator
Mac OS X Secure Erase
Many others
Some erase whole disk, some only erase files or
unused blocks, others erase only header & footer
Presence of these tools may be treated as evidence
of guilt in court
Especially if they were used just before evidence seizure
Some Wipers use Repeating
Patterns
This is a sign of disk erasure
Defragmentation