Peter Gutmann Department of Computer Science University of Auckland pgut001@cs.auckland.ac.nz This paper was first published in the Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, 1996 Abstract With the use of increasingly sophisticated encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One avenue of