Open Access   Article Go Back

Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics

Arvind S. Kapse1 , Vilas M. Thakare2 , Avinash S. Kapse3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 856-862, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.856862

Online published on Oct 31, 2018

Copyright © Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse, “Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.856-862, 2018.

MLA Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse "Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics." International Journal of Computer Sciences and Engineering 6.10 (2018): 856-862.

APA Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse, (2018). Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics. International Journal of Computer Sciences and Engineering, 6(10), 856-862.

BibTex Style Citation:
@article{Kapse_2018,
author = {Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse},
title = {Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {856-862},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3110},
doi = {https://doi.org/10.26438/ijcse/v6i10.856862}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.856862}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3110
TI - Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics
T2 - International Journal of Computer Sciences and Engineering
AU - Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 856-862
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
438 299 downloads 249 downloads
  
  
           

Abstract

Digital forensics tools are often used to calculate the hash value of the digital test unit. The MD5 and SHA hash function is used in digital forensics tools to calculate and verify that a dataset has not been altered, due to the application of multiple collection and analysis tools and pro-cedures of evidence. In addition, because of the impact on the personal life of the subject of the survey, the verification of the proper functioning of the tools and procedures is crucial. This article discusses the importance of hashing value in digital forensics for digital evidence. The search uses six different possible cases as an experiment to generate and verify the hash value of the test drive by using a forensic tool to demonstrate the importance of the hash value in digital forensics. In addition, unreliable results can be obtained due to incorrect use of the Tools application.

Key-Words / Index Term

SHA; MD5; hash function ; digital forensic

References

[1]. S. Ardisson. Producing a Forensic Image of Your Client’s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2017.
[2]. “Digital signature standard,” FIPS PUB 186-2, 2016. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
[3]. G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS), August 2016.
[4]. M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.
[5]. M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-12, 2002.
[6]. Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edi-tion, Course Technology, 2008.
[7]. Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt
[8]. Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm
[9]. Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.