[15478] in cryptography@c2.net mail archive
Examining the Encryption Threat
daemon@ATHENA.MIT.EDU (Peter Parker)
Fri May 28 09:08:39 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Peter Parker" <peterparker@fastmail.fm>
To: cryptography@metzdowd.com
Date: Thu, 27 May 2004 22:41:33 -0700
Hi,
In one of the issue of ijde found at
http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have
analysed various encryption applications and discussed results for few
sample applications. Does any one have the complete results. Tried
mailing the author but no response. Any one having further info.
Abstract from the paper
"This paper is the result of an intensive six-month investigation into
encryption technologies conducted at the Computer Forensic Research &
Development Center (CFRDC) at Utica College. A significant number of
encryption applications were collected and cataloged. A roadmap for the
identification of the unique characteristics of encrypted file formats
was created. A number of avenues were explored and the results
documented. The actual process is not outlined comprehensively due to
proprietary needs; however, the following briefly details the process and
the significance of our findings."
Regards,
--=20
peter
peterparker@fastmail.fm
--=20
http://www.fastmail.fm - And now for something completely different=85
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com