UIJRT » United International Journal for Research & Technology

Encryption Data Recover from Memory

Total Views / Downloads: 148 

Cite ➜

Alam, H.K., Sang, J., Hu, H., Rahman, M.A. and Alam, M.M., 2021. Encryption Data Recover from Memory. United International Journal for Research & Technology (UIJRT), 2(6), pp.58-66.


As encrypted holders are experienced all the more much of the time the requirement for live imaging is probably going to increment; in any case, a procured live image of an open encrypted record framework can’t later be checked against any unique proof, since when the force is expelled, the decrypted substance is not at this point available. This paper shows that if a memory image is additionally gotten simultaneously as live compartment image, by the structure of on-the-fly encryption, decoding keys can be recuperated from the memory dump. These keys would then be able to be used disconnected to access the scrambled holder document, encouraging norm, repeatable, criminological record framework examination. The recuperation technique used a straight sweep of memory to produce preliminary keys from all conceivable memory positions to decode the compartment. The viability of this methodology is shown by recouping TrueCrypt decoding keys from a memory dump of a Windows system.

Keywords: Encryption, Data recover, Information recover, Data security, Decryption.


  1. Milana Pisaric: “Encryption as a challenge for European law enforcement agencies”. 2020
  2. Cui, R. H. Deng, Y. Li and G. Wu, “Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud,” in IEEE Transactions on Big Data, vol. 5, no. 3, pp. 330-342, 1 Sept. 2019
  3. Cui, R. H. Deng, Y. Li and G. Wu, “Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud,” in IEEE Transactions on Big Data, vol. 5, no. 3, pp. 330-342, 1 Sept. 2019
  4. De Carli, R. Torres, G. Modelo-Howard, A. Tongaonkar and S. Jha, “Botnet protocol inference in the presence of encrypted traffic,” IEEE INFOCOM 2017 – IEEE Conference on Computer Communications, Atlanta, GA, 2017
  5. P. Craiger, M. Pollitt, and J. Swauger: “Law Enforcement and Digital Evidence”, 2005
  6. MihirBellare, SriramKeelveedhi, ThomasRistenpart: “Server-Aided Encryption for Deduplicated Storage” 2013
  7. Kazim, F. Almaeeni, S. A. Ali, F. Iqbal and K. Al-Hussaeni, “Memory Forensics: Recovering Chat Messages and Encryption Master Key,” 2019 10th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 2019
  8. Wolfe, “Encountering Encryption: “Computers and Security” 2003
  9. Carvey: “Windows Forensic Analysis,” 2018
  10. Dawn Xiaoding Song; D. Wagner; A. Perrig: “Practical techniques for searches on encrypted data”, 2000
  11. Walters, and N. Petroni, “Volatools:Integrating Volatile Memory Forensics into the Digital Investigation Process”, 2007
  12. Miao, “Research and analysis on Encryption Principle of TrueCrypt software system,” The 2nd International Conference on Information Science and Engineering, Hangzhou, 2010
  13. L. T. Uymatiao and W. E. S. Yu, “Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore,” 2014 4th IEEE International Conference on Information Science and Technology, Shenzhen, 2014
  14. David Garcia Cervet: “Offline access in a document control system” 2013
  15. Robert R. Jueneman, Duane J. Linsenbardt, John N. You, William Reid Carlisle, Burton George Tregub: “Portable data encryption device with configurable security functionality and method for file encryption”, 2015
  16. David Garcia, Brett Wilson: “Cloud based media player and offline media access.” 2011
  17. Agnihotri, S. Ahmed, D. Darekar, C. Gadkari, S. Jaikar and M. Pawar, “A Secure Document Archive Implemented using Multiple Encryption,” 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 2020
  18. Rodger P. Wilson: “Method, system and program for encrypting files in a computer system.” 2005
  19. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis and E. K. Markakis, “A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues,” in IEEE Communications Surveys & Tutorials, vol. 22, no. 2, 2020
  20. Adelstein, “Live Forensics: Diagnosing your system without killing it first”, 2006
  21. H. Saračević et al., “Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures,” in IEEE Transactions on Reliability, 2020
  22. Shiza Hasan, Muhammad Awais, Munam Ali Shah et al, “A Comparison on Data Management Attributes”, 2018
  23. Meyers, A. R. Ikuesan and H. S. Venter, “Automated RAM analysis mechanism for windows operating system for digital investigation,” 2017 IEEE Conference on Application, Information and Network Security (AINS), Miri, 2017, pp. 85-90, 2017

For Conference & Paper Publication​

UIJRT Publication - International Journal