Need computer science help with Passwords and Encryption

Nov 15th, 2015
KateS
Category:
Computer Science
Price: $20 USD

Question description

This week's reading gives you basic technical information about passwords and encryption, and discussed how you might recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files that are hidden in other file types (usually image/picture files).

Interestingly, the use of stego goes much farther back than the advent of computers.  Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. While cryptography scrambles a message so that it is unreadable, but still visible, stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on those subjects), but rather to help you understand their place in the criminal justice process.

If you are - or are working for - law enforcement, does a warrant give you the authority to break passwords or to decipher encrypted data? This is a very important question. As we have discussed, it is important to make sure you know the limits of the warrant.  While you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.

This week I would like you to do some research on encryption and steganography.  First, list five examples each of how steganography, encryption or cryptology were used BEFORE the advent of computers. Then, discuss how steganography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UCLA
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
Five Star Tutor
Dec 5th, 2016
" Outstanding Job!!!! "
SjSurvivor143
Nov 19th, 2016
" Thanks for the help. "
Joemoe
Nov 6th, 2016
" <3 it, thanks for saving me time. "
tinytim47
Oct 28th, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
pmallory
Oct 23rd, 2016
" Totally impressed with results!! :-) "
mixedballz
Oct 14th, 2016
" excellent work as always thanks for the help "
kiln82
Oct 1st, 2016
" awesome work thanks "
darnay
Sep 22nd, 2016
" The best tutor out there!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1822 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors