Significance of Hash Value Generation in Digital Forensic: A Case Study
نویسندگان
چکیده
–Digital forensics tools frequently use to calculate the hash value of digital evidence drive. MD5 and SHA hash function is used in digital forensic tools to calculate and verify that a data set has not been altered, due to the application of various evidence collection and analysis tools and procedures. Additionally, due to the impact on the personal life of the subject of an investigation, verification of the correct operation of tools and procedures is critical. This paper discusses the significance of hash value in digital forensic for the digital evidence. The research conducts six possible different cases as an experiment to generate and verify the hash value of test drive using forensic tool to demonstrate the importance of hash value in digital forensic. Additionally, unreliable results can be obtained because of the improper use of the application of the tools. Keywords––MD5; SHA; digital forensic; hash function.
منابع مشابه
Testing Forensic Hash Tools on Sparse Files
Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken by using a forensic hash tool. If later in a court of law the identical fingerprint can be computed from the presented evidence, the evidence is taken to be original. In this paper we demonstrate that most of the freely ...
متن کاملThe Impact of MD5 File Hash Collisions On Digital Forensic Imaging
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks ...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملتأثیر محیط دیجیتال بر عادت و روشهای خواندن جوانان
Purpose: In digital age, web applications work as machines that swallow time rapidly. A new generation tendency to use these tools for entertaining and information gathering has changed their habits in type of selected materials and reading practices. In other words, although users currently receive information from internet, they have increasingly become superficial readers who have a little i...
متن کاملTesting the forensic soundness of forensic examination environments on bootable media
In this work we experimentally examine the forensic soundness of the use of forensic bootable CD/DVDs as forensic examination environments. Several Linux distributions with bootable CD/DVDs which are marketed as forensic examination environments are used to perform a forensic analysis of a captured computer system. Before and after the bootable CD/DVD examination, the computer system's hard dis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012