Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics. Jaskolka, J., Khedri, R., & Sabri, K. E. In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34, of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 266 - 275, Niagara Falls, ON, Canada, August, 2014. \textbf(Invited Paper)
abstract   bibtex   
This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.
@inproceedings{Jaskolka2014ae,
	Abstract = {This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.},
	Address = {Niagara Falls, ON, Canada},
	Author = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},
	Booktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},
	Month = {August},
	Note = {\textbf{\textit{(Invited Paper)}}},
	Pages = {266 - 275},
	Series = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},
	Title = {Investigative Support for Information Confidentiality Part {II}: Applications in Cryptanalysis and Digital Forensics},
	Volume = {34},
	Year = {2014}
}

  

%-------

Downloads: 0