hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Perspective Chapter: Distinguishing Encrypted from Non-Encrypted Data
Halmstad University, School of Information Technology.ORCID iD: 0000-0001-9307-9421
Atsec Information Security, USA.
2022 (English)In: Lightweight Cryptographic Techniques and Cybersecurity Approaches / [ed] Srinivasan Ramakrishnan, Rijeka: InTech, 2022Chapter in book (Refereed)
Abstract [en]

Discriminating between encrypted and non-encrypted information is desired for many purposes. Much of the efforts in this direction in the literature is focused on deploying machine learning methods for the discrimination in streamed data which is transmitted in packets in communication networks. Here, however, the focus and the methods are different. The retrieval of data from computer hard drives that have been seized from police busts against suspected criminals is sometimes not straightforward. Typically the incriminating code, which may be important evidence in subsequent trials, is encrypted and quick deleted. The cryptanalysis of what can be recovered from such hard drives is then subject to time-consuming brute forcing and password guessing. To this end methods for accurate classification of what is encrypted code and what is not is of the essence. Here a procedure for discriminating encrypted code from non-encrypted is derived. Two methods to detect where encrypted data is located in a hard disk drive are detailed using passive change-point detection. Measures of performance of such methods are discussed and a new property for evaluation is suggested. The methods are then evaluated and discussed according to the performance measures. 

Place, publisher, year, edition, pages
Rijeka: InTech, 2022.
Keywords [en]
likelihood ratio, change-point detection, cryptology, compression, uniform distribution
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:hh:diva-49909DOI: 10.5772/intechopen.102856ISBN: 978-1-80355-732-8 (print)ISBN: 978-1-80355-734-2 (electronic)OAI: oai:DiVA.org:hh-49909DiVA, id: diva2:1733738
Available from: 2023-02-03 Created: 2023-02-03 Last updated: 2023-02-03Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Järpe, Eric

Search in DiVA

By author/editor
Järpe, Eric
By organisation
School of Information Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 53 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf