Module 5-3 - Computer-Forensics
Module 5-3 - Computer-Forensics
Antiforensics
(part 3)
Topics
• Encryption
• Breaking Encryption
• Hiding and Destroying Data
Antiforensics
http://fpt.edu.vn 06/04/24 11
Problems
Symmetric Asymmetric
• Keys must be distributed in • slow (~1000 times slower
secret than the symmetric)
• If a key is compromised, Eve • vulnerable to chosen-plaintext
(eavesdropper) can attacks
decrypt any message
pretend to be one of the parties
• A network requires a great
number of keys
Symmetric Cryptography
One key encrypts and decrypts data
13
Asymmetric Cryptography
Algorithms
• Use two keys that are mathematically related
– Data encrypted with one key can be decrypted only
with the other key
• Another name for asymmetric key
cryptography is public key cryptography
14
Asymmetric Cryptography
15
Popular Algorithms
• Symmetric Encryption
– DES, 3DES, AES, Blowfish
• Asymmetric Encryption
– RSA, ECC, ElGamal
• The most secure algorithms are open-source
– Proprietary, secret algorithms are almost always insecure
Keys
17
Brute Force Attack
18
How Many Bits Do You Need?
19
Practical Key Lengths
http://fpt.edu.vn 06/04/24 34
http://fpt.edu.vn 06/04/24 35
Steganography
• Hiding a
payload file
inside another
carrier file
• Used by Osama
Bin Laden and
Russian spies
Stegan0graphy Detection Tools
Hiding and Destroying Data
Data Destruction
• Drive Wiping
– Darik's Boot and Nuke (DBAN)
– Window Washer
– Evidence Eliminator
– Mac OS X Secure Erase
• Many others
• Some erase whole disk, some only erase files or unused blocks,
others erase only header & footer
• Presence of these tools may be treated as evidence of guilt in
court
– Especially if they were used just before evidence seizure
Some Wipers use Repeating Patterns
http://fpt.edu.vn 06/04/24 43