Security

Some Words About Cryptographic Key Recognition in Data Streams

Download Now Free registration required

Executive Summary

Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems: to create a memory dump from target machine and to distinguish target cryptographic keys from other data. In this paper, the authors present effective algorithms of expanded key recognition for Blowfish and Twofish. As far as they know this task for these algorithms has never been considered before.

  • Format: PDF
  • Size: 253.34 KB