timestamp integrity

16
(Im)Proving Chain of Custody and Digital Evidence Integrity with Time Stamp Jasmin Ćosić and Miroslav Bača IT Section of Police Administration Ministry of Interior of Una-sana canton 502.V.bbr br.2, Bihac, B&H Phone: +387 61 790 484 E-mail: [email protected] ; Faculty of Organization and Informatics University of Zagreb Pavlinska 2, Varazdin, RH Phone: +385 98 552 235 E-mail: [email protected]

Upload: jasmin-cosic

Post on 18-Nov-2014

114 views

Category:

Documents


4 download

DESCRIPTION

digital evidence integrity - prezentation

TRANSCRIPT

Page 1: Timestamp Integrity

(Im)Proving Chain of Custody and Digital Evidence Integrity with Time Stamp

Jasmin Ćosić and Miroslav Bača

IT Section of Police AdministrationMinistry of Interior of Una-sana canton

502.V.bbr br.2, Bihac, B&HPhone: +387 61 790 484 E-mail: [email protected];

Faculty of Organization and InformaticsUniversity of Zagreb

Pavlinska 2, Varazdin, RHPhone: +385 98 552 235 E-mail: [email protected]

Page 2: Timestamp Integrity

08.04.2023 2

INTRODUCTION

• What is “Chain of custody” or “Chain of evidence”?• Chain of custody and integrity of digital evidence play a very

important role in the digital process of forensic investigation.• In every phase forensic investigators must know where,

when and how the digital evidence was discovered, collected, handled with, when and who came in contact with the evidence.

• Chain of custody must include documentation with answers to all these questions.

• If one of these questions remains unanswered, the chain of custody is compromised and disrupted.

Page 3: Timestamp Integrity

08.04.2023 3

INTRODUCTION

• 5 “Ws” and 1 H (What, Who, Where, Why, When and How) ?• Investigator must know how to answer certain questions in the

whole forensic investigation process:– What is digital evidence?– Where was digital evidence discovered, collected, handled and/or examined?– Who came into contact with digital evidence, handled it, and discovered it?– What’s the reason for using the digital evidence?– When the digital evidence is discovered, accessed, examined or transferred?– How is digital evidence used?

• When presenting evidence in court, if one link was missing in the chain of evidence, the court would not accept the evidence as relevant

• The most sensitive variable is the “time of contact” with digital evidence.

Page 4: Timestamp Integrity

08.04.2023 4

DIGITAL EVIDENCE INTEGRITY

• According to Vanstone [3], digital integrity is “the property whereby digital data has not been altered in an unauthorized manner since the time it was created, transmitted, or stored by an authorized source”.

• The integrity of digital evidence ensures that the information presented is complete and unaltered from the time of acquiring until its final disposition. [SWGIT]

Page 5: Timestamp Integrity

08.04.2023 5

DIGITAL EVIDENCE INTEGRITY

• There are several adapted methods for evidence digital signing in order to (im)prove its integrity.

• Today most forensic tools and applications implement some type of checksum or hashing algorithm to allow investigators later to verify the disk or image integrity [4].

• A cryptographic hashing function or algorithm has the following technical characteristics [Table 1]

Page 6: Timestamp Integrity

08.04.2023 6

DIGITAL EVIDENCE INTEGRITYMethod Length Description Advantages DisadvantagesCyclic redundancy checks:CRC 16CRC 32CRC 64

16 bit32 bit64 bit

Circular Redundancy Check – CRC often used in file transfer to verify that the data tranfer was successful.

Very simple to useVery fast Small data in output

Non secure hash functionProblem with message analysisIt’s easy to generate other messages that result in the same CRC

Cryptographic hash function:MD2MD4MD5SHA1SHA224/256SHA384/512

128 bit128 bit128 bit160 bit224/256 bit384/512 bit

Hashing function – establishing mathematical calculation that generates a numerical value based on the input data. This numerical value is referred to as the hash value.

Its easy to compute the hash value for any given messageSecure hash functionCryptographic hash function

Collision and Preimage attack , except SHA 224/256 and SHA 384/512 [5]

Digital signature Depending on the used hash function

The resulting hash (process used in a hash) is encrypted with a specific private key. File integrity can be verified using hash value and the public key.

Binding identity to the integrity

Very slowVery complex to implement

Time stamp Depending on the used hash function

Time stamps are typically used for logging events, in which case each event in a log is marked with a time stamp. In file systems, time stamp may refer to the stored date/time of the file creation or modification. Trusted time stamping is the process of securely keeping track of the creation and modification time of a document.

Bind date and time with integrity

Very complex to implementDependence on the “third party”

Encryption Depending on the used algorithm.

Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as the key. The result of the process is encrypted information. Encryption itself can protect the confidentiality of messages.

Very secure Very slowComplex to implement and maintain

Watermarking

Depending on the used algorithm.

Watermarking is the process of embedding information into another object/signal. It combines aspects of data hashing and digital watermarking.[6]

Very secure and simple to use

User cannot significantly alter some files without sacrificing the quality or utility of the data.

TABLE IMethods for digitally signing a evidence

Page 7: Timestamp Integrity

08.04.2023 7

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

• In the real world, a time stamp can represent some moment in time; in the computer world (digital world) the time stamp represents a specific moment of time but in digital format.

• Time stamp and digital time stamping play a very important role in the digital forensics, because there is a need for knowing the time of certain moments in the investigation process.

• Problem of digital time stamping has been the subject of several researches. • Hosmer [7] emphasizes the use of time to prove the integrity of digital evidence, and

states the 3 steps that we must do in order to effectively use digital evidence to prove the motif, opportunity and means of cybercrimes:– Step 1: Traceability to Legal Time Source– Step 2: Time Distribution– Step 3: Source Digital Time stamping

• There is a lack of research in using a time stamp to improve the integrity of digital evidence, having in mind the fact when the human factor (the staff) access the evidence.

• Time when digital evidence is discovered and collected, and the fact who comes into contact with it is vital to reconstructing and proving integrity

Page 8: Timestamp Integrity

08.04.2023 8

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

• We also must know when digital evidence is transported.

• According to the RFC 3161 standard [10], a trusted time stamp is a time stamp issued by a trusted third party (TTP) acting as a time stamping authority (TSA).

• It is used to prove the existence of certain data before a certain point (e.g. contact with digital evidence) without the possibility that the owner can backdate the time stamps. We can use multiple TSAs to increase reliability and reduce vulnerability.

Page 9: Timestamp Integrity

08.04.2023 9

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

• There is a lot of TSA in the world, in some country a few, and in some (e.g. Croatia) just one [11].

• We can use services of trusted Time Stamping Authority to prove the consistency and integrity of digital evidence in every stage of its existence.

• It is particularly important to have recorded every moment of time when the digital evidence is being accessed. In another situation, chain of custody would be terminated and this would affect the outcome of the investigation.

• This is very important in international exchange of digital evidence and international digital investigation.

Page 10: Timestamp Integrity

08.04.2023 10

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

• When a Time Stamp Authority (TSA), which we contact to get a Time stamp, proceeds our request, there are a few “external auditors” acting as witness. In some case there is one, in some two auditors [12] which document the chain of evidence.

• The process of obtaining a Time stamp from the TSA, which will prove the existence and contact with the digital evidence by all staff at any time, consists of several steps divided in two separate parts:

• On the client side:– Process of making a unique identifier, fingerprint (creating a hash) of digital evidence (SHA-256,

MD5,etc.)– Process of sending a fingerprint to a Time Stamp Authority – Process of verification with Public Key and local storing

• On the side of TSA:– Process of getting a official time from server– Process of adding a time stamp to fingerprint – Process of protecting (signing) with Private Key– Process of sending a digital signature to the client

• These processes are illustrated on the next slide

Page 11: Timestamp Integrity

08.04.2023 11

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

Figure 1:The process of time stamping digital evidence in all stages of digital forensic investigation process

Page 12: Timestamp Integrity

08.04.2023 12

USING TIME STAMP FOR SIGNING DIGITAL EVIDENCE

• Let`s see what happened in this process? • First, investigators (or other staff who handled digital evidence) must generate a

unique identifier – fingerprint of a digital evidence. In this process some of the previously mentioned methods, hash function or, for better security, multiple hash functions can be used. It is proposed to use a high-secured SHA/MD algorithm.

• After generating a hash of digital evidence, these “few bits” are being sent to the “third party” - Time Stamp Authority.

• It is important to mention that only the fingerprint (hash) is transmitted to the TSA, never the original file. TSA cannot see the actual document (not any file). Next what happens is that the TSA on received hash adds a time stamp, calculate new hash and digitally signing a file with protected signing key.

• TSA then sends this file back to the client (investigator), who has another pair of signing key. In the next stage of forensic investigation exactly the same process happens. On this way we can prove the time of digital evidence movement at any stages of forensic investigation.

Page 13: Timestamp Integrity

08.04.2023 13

CONCLUSION

• As digital evidence is in bit/byte form, it is very easy to transfer it to another side of the world in a few seconds [13] . One of the most important thing in forensic process is maintenance of digital evidence chain of custody.

• The purpose of this document is to show a trusted time stamping method to signing a digital evidence in every stage of digital investigation process.

• Time stamp will be available from the secure third party (Time Stamp Authority) and will be used to prove a time when the staff access the evidence in any stage of forensic investigation.

Page 14: Timestamp Integrity

08.04.2023 14

ACKNOWLEDGEMENTS

• The presented data are from the scientific project Methodology of biometrics characteristics evaluation (016-0161199-1721) and practical project Multiple biometric authentication using smart card (2008-043), supported by the Ministry of Science, Education and Sport, Republic of Croatia.

Page 15: Timestamp Integrity

08.04.2023 15

REFERENCES• [1] M.G.Nagaraya, „Investigators chain of custody in digital evidence recovery“, Bureau of Police Research and

Development, Indian Police Journal, 2006• [2] R. Yeager,, „Criminal Computer Forensics Management“, InfoSecCD, ACM, Kennesaw, USA, 2006• [3] S.Vanstone, P. Van Oorschot,, & A. Menezes, „Handbook of Applied Criptografy“, CRC Press, 1997• [4] C. Brown, „Digital evidence: Collecting and Preservation“, 2006• [5] Cryptographic hash function, http://en.wikipedia.org/wiki/• Cryptographic_hash_function#cite_note-13, • (accessed: 04.12.2010) • [6] J.Ćosić, M.Bača, „Steganography and its implication on forensic investigation“, INFOTEH 2010, Jahorina, B&H, in

press• [7] C. Hosmer, „Proving the Integrity of Digital Evidence with Time“ , International Journal of Digital Evidence, Spring

2002, Vol.1, Issue 1• [8] S. Willassen, „Hypothesis based investigation of Digital Time stamps“, IFIP, Advances in Digital Forensic IV, pp.75-86,

2008• [9] B. Schatz, G. Mohay, A. Clark, „ A correlation method for establishing the provenance of time stamps in digital

evidence“ , Digital Investigation, vol 3, 98-107,2006• [10] Internet X.509 PKI, Time Stamp Protocol (TSP), http://tools.ietf.org/html/rfc3161 accessed: 01.01.2010• [11] Financial Agency of Croatia, http://www.fina.hr/ accessed: 31.12.2009• [12] E-TimeStamp, An Internet Notary, http://www.digistamp.com/evidence.htm, • accessed: 02.01.2010• [13] M. Bača, Introduction in computer security, Narodne novine, Zagreb, 2004, (on Croatian)

Page 16: Timestamp Integrity

08.04.2023 16

QUESTIONS ?

THANK`S FOR YOUR ATTENTION !