Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

J. Kelsey and B. Schneier

Second International Workshop on the Recent Advances in Intrusion Detection (RAID '99), September 1999.

ABSTRACT: Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.

[full text - PDF (Acrobat)] [full text - Postscript]

Categories: Protocol Designs

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.