Abstract | ||
---|---|---|
TrueCrypt is a popular and secure encryption software especially suitable for storage protection of personal privacy. In this paper, we present an extensive analysis of TrueCrypt's encryption forensics. At first, we explain the inner pivotal encryption principles including cryptographic algorithms selection, operation mode and key derivation process. In order to conduct data forensics in a practical scenario, we demonstrate a comprehensive data processing procedure that is beginning with encrypted volume identification and then the header extraction and finally password cracking with a targeted dictionary. We expect that our research is helpful for data investigation of entire disk, partitions and file containers generated by the TrueCrypt software.
|
Year | DOI | Venue |
---|---|---|
2019 | 10.1145/3331453.3361328 | Proceedings of the 3rd International Conference on Computer Science and Application Engineering |
Keywords | DocType | ISBN |
Cryptographic algorithms, Data Forensics, Storage encryption, TrueCrypt | Conference | 978-1-4503-6294-8 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lijun Zhang | 1 | 245 | 37.10 |
Xiaoyan Deng | 2 | 0 | 0.34 |
Cheng Tan | 3 | 34 | 9.73 |