CFP last date
20 December 2024
Reseach Article

Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms

by Veronica Schmitt, Jason Jordaan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 23
Year of Publication: 2013
Authors: Veronica Schmitt, Jason Jordaan
10.5120/11723-7433

Veronica Schmitt, Jason Jordaan . Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms. International Journal of Computer Applications. 68, 23 ( April 2013), 40-43. DOI=10.5120/11723-7433

@article{ 10.5120/11723-7433,
author = { Veronica Schmitt, Jason Jordaan },
title = { Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 23 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number23/11723-7433/ },
doi = { 10.5120/11723-7433 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:44.417654+05:30
%A Veronica Schmitt
%A Jason Jordaan
%T Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 23
%P 40-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MD5 and SHA-1 cryptographic hash algorithms are a standard practice in digital forensics that is used in the preservation of digital evidence and ensuring the integrity of the digital evidence. Recent studies have shown that both MD5 and SHA-1 have vulnerabilities and collisions. Based on this, the use of MD5 and SHA-1 hash algorithms in the practice of digital forensics to preserve and ensure the integrity of digital evidence has been questioned in certain instances. Using experimentation, the researcher proves the validity of using either MD5 or SHA-1 hashing algorithms to ensure the integrity of seized digital evidence, from the moment of seizure of the evidence, through to eventual presentation and use of the evidence in court; thus demonstrating that the use of hashing remains a valid forensic methodology to ensure the integrity of digital evidence.

References
  1. Phillip, A. , Cowen, D. , & Davis, C. (2010). Hacking Exposed Computer Forensics Second Edition. New York: McGraw Hill.
  2. Thompson, E. (2005). MD5 Collisions and the Impact on Computer Forensics. Digital Investigation (2), 36-40.
  3. Prosise, C. , & Mandia, K. (2003). Incident Response and Computer Forensics (2nd Edition). New York: McGraw Hill.
  4. Roussev, V. (2011). An Evaluation of Forensic Similarity Hashes. The Proceedings of the Eleventh Annual DFRWS Conference (pp. S34-S41). Elsevier.
  5. Wang, X. , & Yu, H. (2005). How to Break MD5 and other Hash Functions. Advances in Cryptology - EUROCRYPT 2005 (pp. 19-35). Berlin: Springer.
  6. Wang, X. , Yin, Y. L. , & Yu, H. (2005). Findings Collisions in the Full SHA-1. CRYPTO '05 Proceedings of the 25th Annual International Conference on Advances in Cryptography (pp. 17-36). Berlin: Springer.
  7. Joubert, C. (2001). Applied Law for Police Officials (2nd Edition). Lansdowne: Juta.
  8. Casey, E. (2004). Digital Evidence and Computer Crime (2nd Edition). London: Academic Press.
  9. Carrier, B. (2005). File System Forensic Analysis. Upper Saddle River: Addison-Wesley.
  10. Solomon, M. G. , Barrett, D. , & Broom, N. (2005). Computer Forensics Jump Start. Alameda: Sybex.
  11. Van Der Merwe, D. , Roos, A. , Pistorius, T. , & Eiselen, S. (2008). Information and Communications Technology Law. Durban: LexisNexis.
  12. Republic of South Africa. (2002). The Electronic Communications and Transactions Act 25 of 2002. Pretoria: Government Printer.
  13. Schwikkard, P. J. , & Van Der Merwe, S. E. (2002). Principles of Evidence. Cape Town: Juta.
  14. Saunders, M. , Lewis, P. , & Thornhill, A. (2009). Research Methods for Business Students (5th Edition). Essex: Prentice Hall.
Index Terms

Computer Science
Information Sciences

Keywords

Digital forensics integrity of digital evidence hash collisions MD5 SHA-1 manipulation of digital evidence