Security Analysis and Decryption of Filevault 2.
Omar ChoudaryFelix GröbertJoachim MetzPublished in: IFIP Int. Conf. Digital Forensics (2013)
Keyphrases
- security analysis
- encryption scheme
- encryption algorithm
- public key
- standard model
- smart card
- secret key
- security model
- high security
- secure communication
- authentication protocol
- image encryption
- lossless compression
- security properties
- security requirements
- ciphertext
- user authentication
- mutual authentication
- secret sharing scheme
- data sharing
- authentication scheme
- hash functions
- proxy signature scheme