Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

On Achieving Encrypted File Recovery

Download
560 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_1,
        author={Xiaodong Lin and Chenxi Zhang and Theodora Dule},
        title={On Achieving Encrypted File Recovery},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={Data Recovery File Carving Computer Forensics Security Block Cipher Encryption/Decryption},
        doi={10.1007/978-3-642-23602-0_1}
    }
    
  • Xiaodong Lin
    Chenxi Zhang
    Theodora Dule
    Year: 2012
    On Achieving Encrypted File Recovery
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_1
Xiaodong Lin1,*, Chenxi Zhang2,*, Theodora Dule1,*
  • 1: University of Ontario Institute of Technology
  • 2: University of Waterloo
*Contact email: Xiaodong.Lin@uoit.ca, c14zhang@engmail.uwaterloo.ca, Theodora.Dule@uoit.ca

Abstract

As digital devices become more prevalent in our society, evidence relating to crimes will be more frequently found on digital devices. Computer forensics is becoming a vital tool required by law enforcement for providing data recovery of key evidence. File carving is a powerful approach for recovering data especially when file system metadata information is unavailable. Many file carving approaches have been proposed, but cannot directly apply to encrypted file recovery. In this paper, we first identify the problem of encrypted file recovery, and then propose an effective method for encrypted file recovery through recognizing the encryption algorithm and mode in use. We classify encryption modes into two categories. For each category, we introduce a corresponding mechanism for file recovery, and also propose an algorithm to recognize the encryption algorithm and mode. Finally, we theoretically analyze the accuracy rate of recognizing an entire encrypted file in terms of file types.