Hashing and data Fingerprinting in digital Forensics

被引:26
|
作者
Roussev, Vassil [1 ]
机构
[1] Univ New Orleans, Dept Comp Sci, New Orleans, LA 70148 USA
关键词
Digital forensics; Fingerprinting; Hashing; Security;
D O I
10.1109/MSP.2009.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some of the significant problems that need to be resolved to make 'hashing' an useful tool in digital forensic investigations, are discussed. Hashing of data can be used to validate data integrity and identify known content because of their high throughput and memory efficiency. A hash function can take an arbitrary string of binary data and produces a number, termed a digest, in a predefined patterns. Cryptographic hash functions like MD5, RIPEDMD-160, SHA-1, SHA-256, and SHA-512 are designed to be collision resistant and to produce 128- to 512-bit results. Hashing algorithms like checksums, polynomial hashes, and universal hashes have very limited use in digital forensics. Hashing can also help to efficiently and rapidly find versions of known objects, with which an inquiry can be narrowed. It can also be used to screen targets for trace evidence like remnants of a JPEG files, without depending on file system metadata.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [41] A template for creating and sharing ground truth data in digital forensics
    Horsman, Graeme
    JOURNAL OF FORENSIC SCIENCES, 2024, 69 (04) : 1456 - 1466
  • [42] Likelihood ratios for categorical count data with applications in digital forensics
    Longjohn, Rachel
    Smyth, Padhraic
    Stern, Hal S.
    LAW PROBABILITY & RISK, 2022, 21 (02): : 91 - 122
  • [43] Answering to 5W Using Digital Forensics Data
    Ferrante, Carmelo
    Habibnia, Babak
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 185 - 193
  • [44] Digital forensics in healthcare: An analysis of data associated with a CPAP machine
    Schmitt, Veronica
    Butterfield, Emlyn
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 48
  • [45] Anti-Forensics with Steganographic Data Embedding in Digital Images
    Sun, Hung-Min
    Weng, Chi-Yao
    Lee, Chin-Feng
    Yang, Cheng-Hsing
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1392 - 1403
  • [46] Big Data Computing for Digital Forensics on Industrial Control Systems
    Rrushi, Julian
    Nelson, Philip A.
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, : 593 - 598
  • [47] Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
    Balogun, Adedayo M.
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (05) : 36 - 40
  • [48] Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable
    Goebel, Thomas
    Baier, Harald
    Breitinger, Frank
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (03):
  • [49] Locality Sensitive Hashing for Network Traffic Fingerprinting
    Mashnoor, Nowfel
    Thom, Jay
    Rouf, Abdur
    Sengupta, Shamik
    Charyyev, Batyr
    2023 IEEE 29TH INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS, LANMAN, 2023,
  • [50] Specifying digital forensics: A forensics policy approach
    Taylor, Carol
    Endicott-Popovsky, Barbara
    Frincke, Deborah A.
    DIGITAL INVESTIGATION, 2007, 4 : S101 - S104