Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Research Article

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

Download
436 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_23,
        author={Ning Ding and Dawu Gu and Zhiqiang Liu},
        title={Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose},
        proceedings={Forensics in Telecommunications, Information, and Multimedia. Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers},
        proceedings_a={E-FORENSICS},
        year={2012},
        month={10},
        keywords={Symmetric Encryption Obfuscation Anti-forensics},
        doi={10.1007/978-3-642-23602-0_23}
    }
    
  • Ning Ding
    Dawu Gu
    Zhiqiang Liu
    Year: 2012
    Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
    E-FORENSICS
    Springer
    DOI: 10.1007/978-3-642-23602-0_23
Ning Ding1,*, Dawu Gu1,*, Zhiqiang Liu1,*
  • 1: Shanghai Jiao Tong University
*Contact email: dingning@sjtu.edu.cn, dwgu@sjtu.edu.cn, ilu_zq@sjtu.edu.cn

Abstract

In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt a cipher text he encrypted to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypted file to a meaningful file other than that one he encrypted, in the case that he is catched by the forensics investigator and ordered to hand over the key for decryption.