KIT | KIT-Bibliothek | Impressum | Datenschutz

Advanced Cryptographic Techniques for Protecting Log Data

Hartung, Gunnar Richard

Abstract (englisch):
This thesis examines cryptographic techniques providing security for computer log files.
It focuses on ensuring authenticity and integrity, i.e. the properties of having been created by a specific entity and being unmodified.
Confidentiality, the property of being unknown to unauthorized entities, will be considered, too, but with less emphasis.

Computer log files are recordings of actions performed and events encountered in
computer systems. While the complexity of computer systems is steadily growing, it is increasingly difficult to predict how a given system will behave under certain
conditions, or to retrospectively reconstruct and explain which events and conditions led to a specific behavior.
Computer log files help to mitigate the problem of retracing a system’s behavior retrospectively by providing a (usually chronological) view of events
and actions encountered in a system.

Authenticity and integrity of computer log files are widely recognized security requirements, see e.g. [Latham, ed., "Department of Defense Trusted Computer System Evaluation Criteria", 1985, p. 10], [Kent and Souppaya, "Guide to Computer Security Log Management", NIST Special Publication 800-92, 2006, Section 2.3.2], [Guttman and Roback, "An Introduction to Computer Security: The NIST Handbook", superseded NIST Special Publication 800-12, 1995, Section 18.3.1],
... mehr

Open Access Logo


Volltext §
DOI: 10.5445/IR/1000117650
Veröffentlicht am 12.03.2020
Cover der Publikation
Zugehörige Institution(en) am KIT Institut für Theoretische Informatik (ITI)
Kompetenzzentrum für angewandte Sicherheitstechnologie (KASTEL)
Publikationstyp Hochschulschrift
Publikationsdatum 12.03.2020
Sprache Englisch
Identifikator KITopen-ID: 1000117650
HGF-Programm 46.12.03 (POF III, LK 01)
Data Security
Verlag Karlsruhe
Umfang VII, 144 S.
Abschlussart Dissertation
Fakultät Fakultät für Informatik (INFORMATIK)
Institut Institut für Theoretische Informatik (ITI)
Prüfungsdatum 28.10.2019
Referent/Betreuer Prof. J. Müller-Quade
Schlagwörter Forward Security, Digital Signatures, Cryptography, IT Forensics, Secure Logging, Integrity, Authenticity
KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft
KITopen Landing Page