WIT Press


Forced Encryption Solutions

Price

Free (open access)

Volume

30

Pages

7

Published

2004

Size

222 kb

Paper DOI

10.2495/NL040261

Copyright

WIT Press

Author(s)

H.B. Wolfe

Abstract

This paper is intended to introduce the reader to various techniques and tools that can be used to force a solution of encrypted data without the use of cryptanalysis. The relevance of these techniques becomes apparent when attempting to view potential evidence files that have been encrypted and the suspect refuses to cooperate by providing their keys. Keywords: electronic evidence, surveillance, forensics, chain of evidence, evidentiary copy, evidence acquisition, encryption. 1 Introduction Investigation and capture of electronic evidence inevitably includes encrypted data. In the first instance, the Court can and usually will direct the accused to provide their keys. If this directive is successful then no further action is necessary and the techniques outlined in this paper will not come into play. However, when keys are not forthcoming the investigator is faced with the difficult proble

Keywords