{"_id":"Z8HHhjpCAByivcMio","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentialitypartiiapplicationsincryptanalysisanddigitalforensics-2014","downloads":0,"creationDate":"2016-02-02T16:45:04.199Z","title":"Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.cas.mcmaster.ca/~khedri/wp-content/uploads/BIBLIOGRAPHY/cvbib.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.","address":"Niagara Falls, ON, Canada","author":[{"firstnames":["Jason"],"propositions":[],"lastnames":["Jaskolka"],"suffixes":[]},{"firstnames":["Ridha"],"propositions":[],"lastnames":["Khedri"],"suffixes":[]},{"firstnames":["Khair","Eddin"],"propositions":[],"lastnames":["Sabri"],"suffixes":[]}],"booktitle":"Proceedings of the 9th International Conference on Future Networks and Communications","month":"August","note":"\\textbf<i>(Invited Paper)</i>","pages":"266 - 275","series":"Procedia Computer Science, FNC 2014 and MobiSPC 2014","title":"Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics","volume":"34","year":"2014","bibtex":"@inproceedings{Jaskolka2014ae,\n\tAbstract = {This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.},\n\tAddress = {Niagara Falls, ON, Canada},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tBooktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},\n\tMonth = {August},\n\tNote = {\\textbf{\\textit{(Invited Paper)}}},\n\tPages = {266 - 275},\n\tSeries = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},\n\tTitle = {Investigative Support for Information Confidentiality Part {II}: Applications in Cryptanalysis and Digital Forensics},\n\tVolume = {34},\n\tYear = {2014}\n}\n\n \n\n%-------\n","author_short":["Jaskolka, J.","Khedri, R.","Sabri, K. E."],"key":"Jaskolka2014ae","id":"Jaskolka2014ae","bibbaseid":"jaskolka-khedri-sabri-investigativesupportforinformationconfidentialitypartiiapplicationsincryptanalysisanddigitalforensics-2014","role":"author","urls":{},"metadata":{"authorlinks":{"khedri, r":"http://www.cas.mcmaster.ca/khedri/"}},"downloads":0,"html":""},"search_terms":["investigative","support","information","confidentiality","part","applications","cryptanalysis","digital","forensics","jaskolka","khedri","sabri"],"keywords":[],"authorIDs":["56b0dd107b46fe41620002a0","5e2492728c3885df010000a8","ZDgv4hpBF44CBhbAY","fjFPj4EHaK6KNXhFi"],"dataSources":["R4pF6oKzFC7B5Dxhj"]}