Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

J. Kelsey and B. Schneier

Second International Workshop on the Recent Advances in Intrusion Detection (RAID '99), September 1999.

ABSTRACT: Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.

[full text – PDF (Acrobat)] [full text – Postscript]

Categories: Protocol Designs

Sidebar photo of Bruce Schneier by Joe MacInnis.