Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics

This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing...

Full description

Saved in:
Bibliographic Details
Published inProcedia computer science Vol. 34; pp. 266 - 275
Main Authors Jaskolka, Jason, Khedri, Ridha, Sabri, Khair Eddin
Format Journal Article
LanguageEnglish
Published Elsevier B.V 2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.
ISSN:1877-0509
1877-0509
DOI:10.1016/j.procs.2014.07.022