Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics
DOI:
https://doi.org/10.26438/ijcse/v6i10.856862Keywords:
SHA, MD5, hash function, digital forensicAbstract
Digital forensics tools are often used to calculate the hash value of the digital test unit. The MD5 and SHA hash function is used in digital forensics tools to calculate and verify that a dataset has not been altered, due to the application of multiple collection and analysis tools and procedures of evidence. In addition, because of the impact on the personal life of the subject of the survey, the verification of the proper functioning of the tools and procedures is crucial. This article discusses the importance of hashing value in digital forensics for digital evidence. The search uses six different possible cases as an experiment to generate and verify the hash value of the test drive by using a forensic tool to demonstrate the importance of the hash value in digital forensics. In addition, unreliable results can be obtained due to incorrect use of the Tools application
References
[1] S. Ardisson. Producing a Forensic Image of Your Client’s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2017.
[2] “Digital signature standard,” FIPS PUB 186-2, 2016. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
[3] G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS), August 2016.
[4] M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.
[5] M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-12, 2002.
[6] Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edi-tion, Course Technology, 2008.
[7] Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt
[8] Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm
[9] Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
