Sciweavers

ISI
2007
Springer

Using Digital Chains of Custody on Constrained Devices to Verify Evidence

13 years 10 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of custody using an algorithm by Jakobsson and by providing a new algorithm that compliments Jakobsson’s algorithm. Our method assumes specialized hardware. The physical hardware is assumed to be memory and processor constrained. Our new algorithm is an online algorithm that generates a hash chain of n hash elements without knowledge of n before it starts. At the same time, as n grows our new algorithm stores only the log n pebbles which are inputs for Jakobsson’s amortized hash chain traversal algorithm. Jakobsson’s algorithm is then used to validate hash elements and thus the digital chain of custody. The complimentary algorithm presented here is used to generate and store the hash chain. The compact representation used by these algorithms is useful to store a large digital chain of custody on a small and...
Phillip G. Bradford, Daniel A. Ray
Added 08 Jun 2010
Updated 08 Jun 2010
Type Conference
Year 2007
Where ISI
Authors Phillip G. Bradford, Daniel A. Ray
Comments (0)