Sciweavers

IACR
2011

Some Words About Cryptographic Key Recognition In Data Streams

12 years 11 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems: to create a memory dump from target machine and to distinguish target cryptographic keys from other data. The latter leads to a new mathematical task: ¾recognition of cryptographic keys in the (random) data stream¿. The complexity of this task signicantly depends on target cryptoalgorithm. For some algorithms (i.e. AES or Serpent) this task is trivial but for other ones it may be very hard. In this work we present eective algorithms of expanded key recognition for Blowsh and Twosh. As far as we know this task for these algorithms has never been considered before.
Alexey Chilikov, Evgeny Alekseev
Added 23 Dec 2011
Updated 23 Dec 2011
Type Journal
Year 2011
Where IACR
Authors Alexey Chilikov, Evgeny Alekseev
Comments (0)