Key extraction-based lawful access to encrypted data: Taxonomy and survey

Lindenmeier C, Hammer A, Gruber J, Röckl J, Freiling F (2024)


Publication Type: Journal article, Review article

Publication year: 2024

Journal

Book Volume: 50

Article Number: 301796

DOI: 10.1016/j.fsidi.2024.301796

Abstract

The rise of end-to-end encryption has enabled end-users to protect their data to a point that classical techniques of lawful access (seizure of devices, wiretaps) are futile. While there is a heated discussion about regulating the access primitive to end-user devices for law enforcement, little attention is given to the technical design of how evidence should be collected. This is especially critical during remote surveillance, as law enforcement may have unrestricted access to end-user devices over longer periods of time. In this paper, we propose the novel category of key extraction-based lawful interception (KEX-LI), meaning that instead of directly accessing plaintext data, law enforcement only extracts the necessary key material from end-user devices, thus minimizing the requirements of data extraction on end-user devices. When subsequently collecting encrypted data (e.g., via wiretapping), law enforcement can use these keys for decryption. We structure and survey the state-of-the-art of key extraction techniques, thus embedding KEX-LI in the broader context of device forensics. Furthermore, we describe specific requirements for a practical solution to conduct KEX-LI and evaluate currently available technical implementations. Our results are intended to help practitioners select the most suitable techniques as well as to identify research gaps.

Authors with CRIS profile

Related research project(s)

How to cite

APA:

Lindenmeier, C., Hammer, A., Gruber, J., Röckl, J., & Freiling, F. (2024). Key extraction-based lawful access to encrypted data: Taxonomy and survey. Forensic Science International: Digital Investigation, 50. https://doi.org/10.1016/j.fsidi.2024.301796

MLA:

Lindenmeier, Christian, et al. "Key extraction-based lawful access to encrypted data: Taxonomy and survey." Forensic Science International: Digital Investigation 50 (2024).

BibTeX: Download