期刊文献+

一种基于对称加密和隐写术的反取证方法 被引量:2

An Anti-forensic Scheme Based on Symmetrical Encryption and Steganography
在线阅读 下载PDF
导出
摘要 提出了一种结合使用对称加密和隐写术的反取证方法。该方法用对称加密和异或运算对文件进行隐秘处理,较好地缓解了传统对称加密中短密钥便于记忆和长密钥更加安全之间的矛盾。在对称密钥泄露的情况下仍能保证隐秘文件的安全。该方法用低开销大幅度提高了破解难度,对隐写的载体文件没有特殊要求,适合在反取证环境中使用。根据此方法,开发了基于Windows平台的反取证原型工具StegEncrypt,该命令行工具可用于使保存或传送的文件难以暴力破解。 In this paper, a anti-forensic scheme based on symmetrical encryption and steganography is proposed. According to the scheme, the secret file is processed by the algorithm of symmetrical encryption and XOR, and it can not be reconstructed by the attacker even the symmetrical key is revealed. The contradiction between convenience of short key and security of long key, which exists in traditional symmetrical eneryption, is mitigated by the scheme. The difficulty of cracking is notably augmented with a low cost and there is no special requirement on the carrier files using in steganography. So the scheme is suitable for the application environment of anti-forensic. On the basis of the scheme, a prototype tool, which is called StegEncrypt, is developed in Windows platform. This command-line tool can be used to make it hard to decrypt the files, which are to be saved or transferred, by force.
作者 王灿 秦志光
出处 《南京邮电大学学报(自然科学版)》 2009年第3期27-31,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
关键词 反取证 对称加密 隐写术 anti-forensic symmetrical encryption steganography
  • 相关文献

参考文献13

二级参考文献39

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 8NTI. Computer Evidence Processing Steps. http://www.forensics-intl.com/evidguid.html.
  • 9Saudi M M. An Overview of Disk Imaging Tool in Computer Forensics. http://www.sans.org/rr/pape rs/27/643.pdf.
  • 10Data Capture Tool. http://www.forensics-intl.com.

共引文献271

同被引文献10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部