Some Words About Cryptographic Key Recognition in Data Streams

Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems: to create a memory dump from target machine and to distinguish target cryptographic keys from other data. In this paper, the authors present effective algorithms of expanded key recognition for Blowfish and Twofish. As far as they know this task for these algorithms has never been considered before.

Provided by: Passware Topic: Security Date Added: Nov 2011 Format: PDF

Download Now

Find By Topic