2009 | OriginalPaper | Buchkapitel
Investigating Encrypted Material
verfasst von : Niall McGrath, Pavel Gladyshev, Tahar Kechadi, Joe Carthy
Erschienen in: Forensics in Telecommunications, Information and Multimedia
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then s/he is faced with the problem of how to determine the evidential value of the material. This research is proposing a methodology of extracting probative value from the encrypted file of a hybrid cryptosystem. The methodology also incorporates a technique for locating the original plaintext file. Since child pornography (KP) images and terrorist related information (TI) are transmitted in encrypted format the digital investigator must ask the question
Cui Bono?
– who benefits or who is the recipient? By doing this the scope of the digital investigation can be extended to reveal the intended recipient.