2009 | OriginalPaper | Chapter
Investigating Encrypted Material
Authors : Niall McGrath, Pavel Gladyshev, Tahar Kechadi, Joe Carthy
Published in: Forensics in Telecommunications, Information and Multimedia
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then s/he is faced with the problem of how to determine the evidential value of the material. This research is proposing a methodology of extracting probative value from the encrypted file of a hybrid cryptosystem. The methodology also incorporates a technique for locating the original plaintext file. Since child pornography (KP) images and terrorist related information (TI) are transmitted in encrypted format the digital investigator must ask the question
Cui Bono?
– who benefits or who is the recipient? By doing this the scope of the digital investigation can be extended to reveal the intended recipient.