Download Now Free registration required
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems: to create a memory dump from target machine and to distinguish target cryptographic keys from other data. In this paper, the authors present effective algorithms of expanded key recognition for Blowfish and Twofish. As far as they know this task for these algorithms has never been considered before.
- Format: PDF
- Size: 253.34 KB