Hashing and data Fingerprinting in digital Forensics

被引:26
|
作者
Roussev, Vassil [1 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
关键词
Digital forensics; Fingerprinting; Hashing; Security;
D O I
10.1109/MSP.2009.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the significant problems that need to be resolved to make 'hashing' an useful tool in digital forensic investigations, are discussed. Hashing of data can be used to validate data integrity and identify known content because of their high throughput and memory efficiency. A hash function can take an arbitrary string of binary data and produces a number, termed a digest, in a predefined patterns. Cryptographic hash functions like MD5, RIPEDMD-160, SHA-1, SHA-256, and SHA-512 are designed to be collision resistant and to produce 128- to 512-bit results. Hashing algorithms like checksums, polynomial hashes, and universal hashes have very limited use in digital forensics. Hashing can also help to efficiently and rapidly find versions of known objects, with which an inquiry can be narrowed. It can also be used to screen targets for trace evidence like remnants of a JPEG files, without depending on file system metadata.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [21] Retrieval and Perfect Hashing Using Fingerprinting
    Mueller, Ingo
    Sanders, Peter
    Schulze, Robert
    Zhou, Wei
    EXPERIMENTAL ALGORITHMS, SEA 2014, 2014, 8504 : 138 - 149
  • [22] Data Mining Techniques to Facilitate Digital Forensics Investigations
    Lopez, Erik Miranda
    Kim, Yoon Ho
    Park, Jong Hyuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 376 - 379
  • [23] Data Collection and Audit Logs of Digital Forensics in Cloud
    Sumalatha, M. R.
    Batsa, Pranab
    2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [24] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
  • [25] Collusion-secure fingerprinting for digital data
    Boneh, D
    Shaw, J
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
  • [26] Quantum Hashing via ε-Universal Hashing Constructions and Freivalds' Fingerprinting Schemas
    Ablayev, Farid
    Ablayev, Marat
    DESCRIPTIONAL COMPLEXITY OF FORMAL SYSTEMS, DCFS 2014, 2014, 8614 : 42 - 52
  • [28] Recycling Personal Data: Data Reuse and Use Limitation in Digital Forensics
    Custers, Bart
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2015, 2015, 157 : 209 - 211
  • [29] Digital Forensics
    Caloyannides, Michael A.
    Memon, Nasir
    Venema, Wietse
    IEEE SECURITY & PRIVACY, 2009, 7 (02) : 16 - 17
  • [30] Digital Forensics
    Delp, Edward
    Memon, Nasir
    Wu, Min
    IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) : 14 - 15