<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>acin</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Acta Infologica</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2602-3563</issn>
                                                                                            <publisher>
                    <publisher-name>İstanbul Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.26650/acin.804201</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="en">
                                    <trans-title>Password Cracking Methods and Techniques in Computer Forensic Investigation</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Adli Bilişim İncelemelerinde Şifre Kırma Yöntem ve Teknikleri</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-3700-4825</contrib-id>
                                                                <name>
                                    <surname>Kara</surname>
                                    <given-names>İlker</given-names>
                                </name>
                                                                    <aff>ÇANKIRI KARATEKİN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20210629">
                    <day>06</day>
                    <month>29</month>
                    <year>2021</year>
                </pub-date>
                                        <volume>5</volume>
                                        <issue>1</issue>
                                        <fpage>27</fpage>
                                        <lpage>38</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20201002">
                        <day>10</day>
                        <month>02</month>
                        <year>2020</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20210222">
                        <day>02</day>
                        <month>22</month>
                        <year>2021</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2017, Acta Infologica</copyright-statement>
                    <copyright-year>2017</copyright-year>
                    <copyright-holder>Acta Infologica</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="en">
                            <p>The unending increase in information systems and data use has triggered the birth of danger to information security. According to recently published reports, apart from military forces and e-commerce websites, ordinary users have begun to use encryption techniques to protect systems and documents. In spite of precautions, smart attacks prepared using a variety of concealing techniques overcome available protection methods and can obtain the passwords and user names of on the target system. Corporate firms and ordinary users commonly use new-generation encryption methods to hide their data. This situation creates large obstacles forto the investigation of computer systems and files which are the subject of forensic events, especially. If a suspect uses a computer system with encrypted files, to obtain evidence, firstly, it is necessary to know these encryptions or to crack them. In this step, if the suspect does not give law enforcement the encryptions willingly, forensic experts attempt to break the encryption with a variety of methods. This process is generally difficult, and in some situations, the encrypted data on the suspect’s system cannot be reached. This study provides two contributions. The first is that a detailed investigation of the most commonly used encryption cracking methods are investigated in detail. Secondly, an example forensic case encrypted with the “BitLocker” data encryption method is investigated and the steps to break the encrypted data are investigated. The results</p></trans-abstract>
                                                                                                                                    <abstract><p>Bilgi sistemleri ve veri kullanımındaki sonsuz artış, bilgi güvenliğinde tehlikenin doğuşunu tetikledi. Son yayınlanan raporlara göre askeri kuvvetler ve e-ticaret web siteleri dışında sıradan kullanıcılarda sistemleri ve belgelerini korumak için şifreleme teknikleri kullanmaya başlanmışlardır. Alınana tedbirlere rağmen çeşitli gizleme tekniklerini kullanarak hazırlanan akıllı saldırılar mevcut korunma yöntemlerini atlatarak hedef sistemdeki parola ve kullanıcı adlarını ele geçirebilmektedir. Kurumsal firmalar ve sıradan kullanıcılar verilerini gizlemek için yeni nesil şifreleme yöntemlerini yaygın olarak kullanmaktadır. Bu durum özellikle adli olaylara konu olan bilgi sistemleri ve dosyaların incelenmesinde büyük engeller oluşturmaktadır. Eğer şüpheli kişi kullanmış olduğu bilgi sistemi veya dosyalarını şifrelenmiş ise delil elde etmek için önce bu şifrelerin önceden bilinmesi ya da şifrenin kırılması gereklidir. Bu adımda şüpheli kendi rızasıyla parola kolluk kuvvetlerine vermemesi durumunda adli uzmanlar çeşitli yönetmelerle şifreleri kırmaya çalışmakta bu süreç genellikle zor olmakta ve bazı durumlarda şüpheli sistemdeki şifreli verilere ulaşılamamaktadır. Bu çalışma iki katkı sunmaktadır. İlk olarak en çok kullanılan şifre kırma yöntemleri detaylı olarak incelenmiştir. İkincisi, “BitLocker” veri şifreleme yöntemiyle şifrelenmiş örnek bir adli vaka incelenerek şifreli verileri kırılma adımları incelenmiştir. Sonuçlardan şifrelenmiş verilerin erişmek için kullanılan yöntemin etkili olduğunu ve şifrelerin kırıldığı göstermektedir.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Şifre Kırma</kwd>
                                                    <kwd>  Veri Şifreleme</kwd>
                                                    <kwd>  Güvenlik Saldırıları</kwd>
                                                    <kwd>  Analiz Yöntemleri</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="en">
                                                    <kwd>Password Cracking</kwd>
                                                    <kwd>  Data Encryption</kwd>
                                                    <kwd>  Security Attacks</kwd>
                                                    <kwd>  Analysis Methods</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Al Fahdi, M., Clarke, N. L., &amp; Furnell, S. M. (2013, August). “Challenges to digital forensics: A survey of researchers &amp; practitioners attitudes and opinions.” In 2013 Information Security for South Africa (pp. 1-8). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Aggarwal, S., Houshmand, S., &amp; Weir, M. (2018). “New technologies in password cracking techniques.” In Cyber Security: Power and Technology (pp. 179-198). Springer, Cham.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Agostini, E., &amp; Bernaschi, M. (2019). “BitCracker: BitLocker meets GPUs”. arXiv preprint arXiv:1901.01337.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Beşkirli, A., Özdemir, D., &amp; Beşkirli, M. (2019). “Şifreleme Yöntemleri ve RSA Algoritması Üzerine Bir İnceleme”. Avrupa Bilim ve Teknoloji Dergisi, 284-291.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Bhanot, R., Hans, R. (2015). “A review and comparative analysis of various encryption algorithms.” International Journal of Security and Its Applications, 9(4): 289-306.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Billet O., Gilbert, H. (2006). “Cryptanalysis of rainbow.” Security and Cryptography for Networks, 4116:336-347.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Castelluccia C., Durmuth M., Perito, D. (2012). “Adaptive password-strength meters from Markov models.” Proc. of the Network and Distributed System Security Symposium.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Dass, A.S., Prabhu, J. (2020). “Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods.” International Journal of Grid and Utility Computing, 11(4):496-508.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Dürmuth, M., Angelstorf, F., Castelluccia, C., Perito, D., &amp; Chaabane, A. (2015, March). “OMEN: Faster password guessing using an ordered markov enumerator”. In International Symposium on Engineering Secure Software and Systems (pp. 119-132). Springer, Cham.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Guddeti, P., Dharavath, N. (2020). “Analysis of password protected Document.” COMPUSOFT: An International Journal of Advanced Computer Technology, 9(7): 3762-3767.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Harichandran, V. S., Breitinger, F., Baggili, I., &amp; Marrington, A. (2016). “A cyber forensics needs analysis survey: Revisiting the domain’s needs a decade later.” Computers &amp; Security, 57, 1-13.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Hassan, N. A. (2019). “Digital Forensics Basics: A Practical Guide Using Windows OS.” Apress.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Hellman, M. (1980). “A cryptanalytic time-memory trade-off.” IEEE transactions on Information Theory, 26(4), 401-406.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Hitaj, B., Gasti, P., Ateniese, G., &amp; Perez-Cruz, F. (2019, June). “Passgan: A deep learning approach for password guessing.” In International Conference on Applied Cryptography and Network Security (pp. 217-237). Springer, Cham.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Hur, U., Park, M., Kim, G., Park, Y., Lee, I., Kim, J. (2019). “Data acquisition methods using backup data decryption of Sony smartphones.” Digital Investigation, 31:200890.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Houshmand S., Aggarwal S. (2017). “Using personal information in targeted grammar-based probabilistic password attacks.” In: IFIP International Conference on Digital Forensics. 285-303.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Kara, İ. (2019). “Kaba Kuvvet Saldırı Tespiti ve Teknik Analizi.” Sakarya University Journal of Computer and Information Sciences, 2(2): 61-69.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Kaya, Ö. F., Öztürk, E. (2017). “Veri ve Ağ Güvenliği İçin Uygulama ve Analiz Çalışmaları.” Istanbul Ticaret Universitesi Fen Bilimleri Dergisi, 16(31): 85-102.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Kelley P.G., Komanduri S., Mazurek M.L., Shay R., Vidas, T., Bauer, L., ... Lopez, J. (2012). “Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms.” In 2012 IEEE symposium on security and privacy, 523-537.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Kanta, A., Coisel, I., &amp; Scanlon, M. (2020). “A survey exploring open source Intelligence for smarter password cracking.” Forensic Science International: Digital Investigation, 35, 301075.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Kumar, S. (2015). “Digital Evidence-Technical Issues.” Advances in Computer Science and Information Technology (ACSIT). 2(11) 42-47.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Lillis, D., Becker, B., O’Sullivan, T., &amp; Scanlon, M. (2016). “Current challenges and future research areas for digital forensic investigation.” arXiv preprint arXiv:1604.03850.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Lehto, M., &amp; Neittaanmäki, P. (Eds.). (2018). “Cyber Security: Power and Technology” (Vol. 93). Springer.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Saračević, M. H., Adamović, S. Z., Miškovic, V. A., Elhoseny, M., Maček, N. D., Selim, M. M., &amp; Shankar, K. (2020). “Data Encryption for Internet of Things Applications Based on Catalan Objects and Two Combinatorial Structures.”</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">IEEE Transactions on Reliability. Oechslin, P. (2003). “Making a faster cryptanalytic time-memory trade-off,” Advances in Cryptology, 617-630.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Raza, M., Iqbal, M., Sharif, M., &amp; Haider, W. (2012). “A survey of password attacks and comparative analysis on methods for secure authentication.” World Applied Sciences Journal, 19(4), 439-444.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Thing V.L.L., Ying H.M. (2009). “A Novel Time-Memory Tradeoff Method for Password Recovery.”</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Noorunnisa, N.S., Afreen, D.K.R. (2016). “Review on Honey Encryption Technique.” International Journal of Science and Research, 2319-7064.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Madsen W. (1998). “Encryption debate rages again.” Network Security, 5: 8-9.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Milo, F., Bernaschi, M., &amp; Bisson, M. (2011). “A fast, GPU based, dictionary attack to OpenPGP secret keyrings.” Journal of Systems and Software, 84(12), 2088-2096.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Thakur, S., Singh, A.K., Ghrera, S.P., Elhoseny, M. (2019). “Multi-layer security of medical data through watermarking and chaotic encryption for telehealth applications.” Multimedia tools and Applications, 78(3):3457-3470.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Narayanan A., Shmatikov V. (2005). “Fast dictionary attacks on passwords using time-space tradeoff,” Proc. of the 12th ACM Conference on Computer and Communications Security, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Zhang Y., Monrose F., Reiter M.K. (2010). “The security of modern password expiration: An algorithmic framework and empirical analysis.” In Proceedings of the 17th ACM conference on Computer and communications security, 176-186.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Wang, X. J., Liao, X. F., &amp; Huang, H. Y. (2013). “Improvement of rainbow table technology based on number cutting of reduction function.” Comput. Eng, 7, 36.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Weir M.S., B. Aggarwal de Medeiros., Glodek B. (2009). “Password cracking using probabilistic context-free grammars,” Proc. of the 30th IEEE Symposium on Security and Privacy, 391-405.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Weir M., Aggarwal S., Collins M., Stern, H. (2010). “Testing metrics for password creation policies by attacking large sets of revealed passwords.” In Proceedings of the 17th ACM conference on Computer and communications security, 162-175.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
