Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal
{"title":"Hash-Algorithms Output for Digital Evidence in Computer Forensics","authors":"Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal","doi":"10.1109/BWCCA.2011.65","DOIUrl":null,"url":null,"abstract":"With the fast developments in computer and internet connections going through the world, the high-tech crime problem is also companying with it on the way. Hash-algorithm is, basically, a crypto-function that enables to output a short-string for any possible input digital strings. One of its applications is able to be used in the field of computer forensics to authenticate the completeness of digital evidence. According to the collision-free nature of hash, any one minor change of strings in function input, the output-strings will be totally diverse. In this paper, we review the hash property and discuss the related applications in computer forensics to enhance the reliability of digital evidence in the investigation of computer crime-events.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2011.65","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
With the fast developments in computer and internet connections going through the world, the high-tech crime problem is also companying with it on the way. Hash-algorithm is, basically, a crypto-function that enables to output a short-string for any possible input digital strings. One of its applications is able to be used in the field of computer forensics to authenticate the completeness of digital evidence. According to the collision-free nature of hash, any one minor change of strings in function input, the output-strings will be totally diverse. In this paper, we review the hash property and discuss the related applications in computer forensics to enhance the reliability of digital evidence in the investigation of computer crime-events.