Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics
Arvind S. Kapse1 , Vilas M. Thakare2 , Avinash S. Kapse3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 856-862, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.856862
Online published on Oct 31, 2018
Copyright © Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse, “Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.856-862, 2018.
MLA Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse "Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics." International Journal of Computer Sciences and Engineering 6.10 (2018): 856-862.
APA Style Citation: Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse, (2018). Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics. International Journal of Computer Sciences and Engineering, 6(10), 856-862.
BibTex Style Citation:
@article{Kapse_2018,
author = {Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse},
title = {Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {856-862},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3110},
doi = {https://doi.org/10.26438/ijcse/v6i10.856862}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.856862}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3110
TI - Result Analysis of Hash Value Generation Using Security Algorithm for Device Forensics
T2 - International Journal of Computer Sciences and Engineering
AU - Arvind S. Kapse, Vilas M. Thakare, Avinash S. Kapse
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 856-862
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
483 | 323 downloads | 276 downloads |
Abstract
Digital forensics tools are often used to calculate the hash value of the digital test unit. The MD5 and SHA hash function is used in digital forensics tools to calculate and verify that a dataset has not been altered, due to the application of multiple collection and analysis tools and pro-cedures of evidence. In addition, because of the impact on the personal life of the subject of the survey, the verification of the proper functioning of the tools and procedures is crucial. This article discusses the importance of hashing value in digital forensics for digital evidence. The search uses six different possible cases as an experiment to generate and verify the hash value of the test drive by using a forensic tool to demonstrate the importance of the hash value in digital forensics. In addition, unreliable results can be obtained due to incorrect use of the Tools application.
Key-Words / Index Term
SHA; MD5; hash function ; digital forensic
References
[1]. S. Ardisson. Producing a Forensic Image of Your Client’s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2017.
[2]. “Digital signature standard,” FIPS PUB 186-2, 2016. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
[3]. G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS), August 2016.
[4]. M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.
[5]. M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-12, 2002.
[6]. Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edi-tion, Course Technology, 2008.
[7]. Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt
[8]. Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm
[9]. Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.