Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics

Authors

  • Kapse AS Singhania University, Pacheri Bari, Dist:-Jhunjhunu, Rajasthan, India
  • Thakare VM Dept.of CSE., Sant Gadge Baba Amravati University, Amravati.Maharashtra, India
  • Kapse AS Dept. of CSE Anuradha Engg. College, Chikhli, Dist:- Buldhana, Maharashtra, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.856862

Keywords:

SHA, MD5, hash function, digital forensic

Abstract

Digital forensics tools are often used to calculate the hash value of the digital test unit. The MD5 and SHA hash function is used in digital forensics tools to calculate and verify that a dataset has not been altered, due to the application of multiple collection and analysis tools and procedures of evidence. In addition, because of the impact on the personal life of the subject of the survey, the verification of the proper functioning of the tools and procedures is crucial. This article discusses the importance of hashing value in digital forensics for digital evidence. The search uses six different possible cases as an experiment to generate and verify the hash value of the test drive by using a forensic tool to demonstrate the importance of the hash value in digital forensics. In addition, unreliable results can be obtained due to incorrect use of the Tools application

References

[1] S. Ardisson. Producing a Forensic Image of Your Client’s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2017.

[2] “Digital signature standard,” FIPS PUB 186-2, 2016. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf

[3] G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS), August 2016.

[4] M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.

[5] M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-12, 2002.

[6] Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edi-tion, Course Technology, 2008.

[7] Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt

[8] Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm

[9] Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.856862
Published: 2025-11-17

How to Cite

[1]
A. S. Kapse, V. M. Thakare, and A. S. Kapse, “Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 856–862, Nov. 2025.

Issue

Section

Research Article