期刊文献+

一种基于计算机取证的信息一致性方案 被引量:3

Message Integrity Scheme on Computer Forensics
下载PDF
导出
摘要 计算机数据自身的脆弱性,使计算机取证信息的一致性问题成为计算机证据鉴定过程中的关键所在。该文在计算机取证的基础上,运用DSA签名机制,提出了一种证明计算机证据完整性的一致性方案。该方案能够在计算机系统运行过程中,实时、安全地转移所获取的取证信息,并进行证据固定,以保证其完整性。在基于某些密码学假设的前提下,证明了方案的安全性。 The frangibility of computer data leads the integrity problem for computer forensics into the issue of computer evidence identification. How to efficiently identify computer evidence with their original state is a fundamental problem. An integrity scheme based on computer forensics and DSA signature is proposed to testify to the integrity of computer evidence. The scheme ensures the integrity of computer evidence, transfers them to another safe room and signs them in real-time. Based on some cryptographic assumptions, the security of the scheme is also proved.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第11期172-173,176,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA142010)
关键词 计算机取证 信息一致性 DSA签名 Computer forensics Message integrity DSA signature
  • 相关文献

参考文献3

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2National Institute of Standards and Technology(N1ST). FIPS PUB 186 Digital Signature Standard[S]. 1994.
  • 3National Institute of Standards and Technology(NIST). FIPS PUB 180 Secure Hash Standard[S]. 1993.

二级参考文献6

共引文献83

同被引文献21

  • 1董晓梅,王大玲,于戈,肖珂,杨景辉.电子证据的获取及可靠性关键技术研究[J].计算机科学,2004,31(6):143-145. 被引量:12
  • 2郝桂英,刘凤,李世忠.网络实时取证模型的研究与设计[J].计算机时代,2007(4):16-18. 被引量:4
  • 3Sommer E Digital Footprints: Assessing Computer Evidence[J]. Criminal Law Review, 1998, (12): 61-78.
  • 4David W J, Calvert S. Digital Evidence[J]. Communications of the ACM, 2002, 45(4): 128.
  • 5Sommer E Computer Forensics: An Introduction Elsevier Advanced Technology[C]//Proc. of the 9th World Conference on Computer Security Audit and Control. London, UK: Elsevier, 1992.
  • 6Schneier B, Kelsey J. Secure Audit Logs to Support Computer Forensics[J]. ACM Transactions on Information and System Security, 1999, 2(2): 159-176.
  • 7Rabin M O. Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance[J]. Journal of ACM, 1989, 36(2): 335-348.
  • 8BRADLEY S, GEORGE M, ANDREW C. A correlation method for establishing provenance of timestamps in digital evidence [J]. Digital Investigation, 2006, 3( 1 ) : 98-107.
  • 9BRUCE J, NIKKEL. A portable network forensic evidence collector [ J]. Digital Investigation, 2006, 3 (3) : 127-135.
  • 10ZOU C, CHIGAN C X. On game theoretic DSA-driven MAC for cognitive radio networks [ J]. Computer Communications, 2009, 32(18) : 1944-1954.

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部