Abstract
Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible plaintexts, depending on the key used or otherwise makes it impossible to prove the existence of the real message without the proper encryption key. This allows the sender to have plausible deniability if compelled to give up their encryption key. Deniable file systems allow for the creation of an encrypted volume on a hard disk and a second, hidden deniable file system created inside with access by a second password. The objective of this research is to establish whether or not evidence of a hidden volume can be found in deniable encryption tools using conventional forensic analysis. A testbed is developed using open source deniable encryption software and forensics tools with the objective of proving or disproving this claim.
Original language | English |
---|---|
Title of host publication | 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM 2009 |
Place of Publication | Piscataway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 169-174 |
Number of pages | 6 |
ISBN (Electronic) | 9781424445615 |
ISBN (Print) | 9781424445608 |
DOIs | |
Publication status | Published - 2009 |
Externally published | Yes |
Event | PACRIM 2009 - 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing - Victoria, BC, Canada Duration: 23 Aug 2009 → 26 Aug 2009 |
Other
Other | PACRIM 2009 - 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing |
---|---|
Country | Canada |
City | Victoria, BC |
Period | 23/08/09 → 26/08/09 |