30.06.2013 Views

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

Cracking Passwords in Forensic Investigations - Scholarly ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Therefore, there is a motivation to perform research <strong>in</strong> order to plan and ga<strong>in</strong><br />

control over the costs or time required for password crack<strong>in</strong>g. Hence, this research<br />

proposes the use of a budget<strong>in</strong>g model to plan and allocate resources for password<br />

crack<strong>in</strong>g cases.<br />

1.3 EXPECTED FINDINGS<br />

The research to be performed will be based on a budget<strong>in</strong>g model (described <strong>in</strong><br />

section 3.2.1). The experiment will be a simulation of hypothetical password<br />

crack<strong>in</strong>g cases and will be planned <strong>in</strong> advance us<strong>in</strong>g the budget<strong>in</strong>g model and an<br />

experimental design. The time budgets for groups or blocks of passwords will be<br />

calculated and the resources needed for password crack<strong>in</strong>g will be allocated.<br />

Then, the budget<strong>in</strong>g model and the experimental design will be followed and<br />

evaluated. The data to be collected will consist of the password crack<strong>in</strong>g times.<br />

F<strong>in</strong>ally, the budget<strong>in</strong>g model will be evaluated on the criterion of whether all the<br />

passwords were cracked with<strong>in</strong> the allocated time budget.<br />

This research expects all of the passwords to be cracked with<strong>in</strong> the<br />

allocated time budget, s<strong>in</strong>ce the budget<strong>in</strong>g model will be based on the relevant<br />

theory with<strong>in</strong> the area of password crack<strong>in</strong>g. It also expects the exact password<br />

crack<strong>in</strong>g times for all the passwords to be variable <strong>in</strong> nature. It is expected that<br />

this research will be able to add to the knowledge of best-practice advice for<br />

forensic <strong>in</strong>vestigators. Also, the evaluation of the research design and entire<br />

research process will help <strong>in</strong> understand<strong>in</strong>g any improvements to the budget<strong>in</strong>g<br />

model or the experimental processes. S<strong>in</strong>ce the experimental processes will be a<br />

simulation of hypothetical cases, the evaluation may also help to further add to<br />

best-practice knowledge and advice for digital forensic <strong>in</strong>vestigators. Digital<br />

forensic <strong>in</strong>vestigators will thus be able to use the knowledge or advice and apply it<br />

to real life cases (with<strong>in</strong> constra<strong>in</strong>ts and limitations).<br />

1.4 CONCLUSION AND STRUCTURE OF THESIS<br />

This chapter has described the background of the study of passwords. Advantages<br />

and disadvantages of the use of passwords have been discussed; the disadvantages<br />

<strong>in</strong>clude the use of a password by a malicious person to encrypt <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g<br />

<strong>in</strong>formation. Due to the security provided by passwords and encryption<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!