信息网络安全 ›› 2014, Vol. 14 ›› Issue (9): 217-219.doi: 10.3969/j.issn.1671-1122.2014.09.051
• Orginal Article • Previous Articles Next Articles
QIAN Jing-jie1, WEI Peng2, SHEN Chang-da1
Received:
Online:
Abstract: LUKS as one of the popular disk encryption technology is common to all versions of Linux and has characteristics as follows: support multi-user / password access to the same device; master key does not rely on user password, the user password can be changed without re-encrypting the user data; use anti-forensic splitter to store the encrypted master key for the sake of safety. Given that most of current forensic software cannot obtain forensics quickly on LUKS volume, this paper researches the principles of LUKS encryption, and based on this, proposes a LUKS decryption method, dependent on the Linux system. This method can greatly improve the forensic efficiency.
Key words: LUKS, master key, key slot, split master key, forensics
QIAN Jing-jie, WEI Peng, SHEN Chang-da. Analysis of Decrypting LUKS Encrypted Volume Offline[J]. 信息网络安全, 2014, 14(9): 217-219.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.09.051
http://netinfo-security.org/EN/Y2014/V14/I9/217