Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Cracking Passwords in Forensic Investigations - Scholarly ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Therefore, there is a motivation to perform research <strong>in</strong> order to plan and ga<strong>in</strong><br />
control over the costs or time required for password crack<strong>in</strong>g. Hence, this research<br />
proposes the use of a budget<strong>in</strong>g model to plan and allocate resources for password<br />
crack<strong>in</strong>g cases.<br />
1.3 EXPECTED FINDINGS<br />
The research to be performed will be based on a budget<strong>in</strong>g model (described <strong>in</strong><br />
section 3.2.1). The experiment will be a simulation of hypothetical password<br />
crack<strong>in</strong>g cases and will be planned <strong>in</strong> advance us<strong>in</strong>g the budget<strong>in</strong>g model and an<br />
experimental design. The time budgets for groups or blocks of passwords will be<br />
calculated and the resources needed for password crack<strong>in</strong>g will be allocated.<br />
Then, the budget<strong>in</strong>g model and the experimental design will be followed and<br />
evaluated. The data to be collected will consist of the password crack<strong>in</strong>g times.<br />
F<strong>in</strong>ally, the budget<strong>in</strong>g model will be evaluated on the criterion of whether all the<br />
passwords were cracked with<strong>in</strong> the allocated time budget.<br />
This research expects all of the passwords to be cracked with<strong>in</strong> the<br />
allocated time budget, s<strong>in</strong>ce the budget<strong>in</strong>g model will be based on the relevant<br />
theory with<strong>in</strong> the area of password crack<strong>in</strong>g. It also expects the exact password<br />
crack<strong>in</strong>g times for all the passwords to be variable <strong>in</strong> nature. It is expected that<br />
this research will be able to add to the knowledge of best-practice advice for<br />
forensic <strong>in</strong>vestigators. Also, the evaluation of the research design and entire<br />
research process will help <strong>in</strong> understand<strong>in</strong>g any improvements to the budget<strong>in</strong>g<br />
model or the experimental processes. S<strong>in</strong>ce the experimental processes will be a<br />
simulation of hypothetical cases, the evaluation may also help to further add to<br />
best-practice knowledge and advice for digital forensic <strong>in</strong>vestigators. Digital<br />
forensic <strong>in</strong>vestigators will thus be able to use the knowledge or advice and apply it<br />
to real life cases (with<strong>in</strong> constra<strong>in</strong>ts and limitations).<br />
1.4 CONCLUSION AND STRUCTURE OF THESIS<br />
This chapter has described the background of the study of passwords. Advantages<br />
and disadvantages of the use of passwords have been discussed; the disadvantages<br />
<strong>in</strong>clude the use of a password by a malicious person to encrypt <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g<br />
<strong>in</strong>formation. Due to the security provided by passwords and encryption<br />
5