计算机取证中数字证据的哈希算法输出

Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal
{"title":"计算机取证中数字证据的哈希算法输出","authors":"Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal","doi":"10.1109/BWCCA.2011.65","DOIUrl":null,"url":null,"abstract":"With the fast developments in computer and internet connections going through the world, the high-tech crime problem is also companying with it on the way. Hash-algorithm is, basically, a crypto-function that enables to output a short-string for any possible input digital strings. One of its applications is able to be used in the field of computer forensics to authenticate the completeness of digital evidence. According to the collision-free nature of hash, any one minor change of strings in function input, the output-strings will be totally diverse. In this paper, we review the hash property and discuss the related applications in computer forensics to enhance the reliability of digital evidence in the investigation of computer crime-events.","PeriodicalId":391671,"journal":{"name":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hash-Algorithms Output for Digital Evidence in Computer Forensics\",\"authors\":\"Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal\",\"doi\":\"10.1109/BWCCA.2011.65\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the fast developments in computer and internet connections going through the world, the high-tech crime problem is also companying with it on the way. Hash-algorithm is, basically, a crypto-function that enables to output a short-string for any possible input digital strings. One of its applications is able to be used in the field of computer forensics to authenticate the completeness of digital evidence. According to the collision-free nature of hash, any one minor change of strings in function input, the output-strings will be totally diverse. In this paper, we review the hash property and discuss the related applications in computer forensics to enhance the reliability of digital evidence in the investigation of computer crime-events.\",\"PeriodicalId\":391671,\"journal\":{\"name\":\"2011 International Conference on Broadband and Wireless Computing, Communication and Applications\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Broadband and Wireless Computing, Communication and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2011.65\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2011.65","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着计算机和互联网连接在世界范围内的快速发展,高科技犯罪问题也随之而来。哈希算法基本上是一种加密功能,可以为任何可能的输入数字字符串输出短字符串。它的一个应用是能够用于计算机取证领域,以验证数字证据的完整性。根据哈希的无冲突特性,函数输入中字符串的任何微小变化,输出字符串都将完全不同。在本文中,我们回顾了哈希属性,并讨论了在计算机取证中的相关应用,以提高计算机犯罪事件调查中数字证据的可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hash-Algorithms Output for Digital Evidence in Computer Forensics
With the fast developments in computer and internet connections going through the world, the high-tech crime problem is also companying with it on the way. Hash-algorithm is, basically, a crypto-function that enables to output a short-string for any possible input digital strings. One of its applications is able to be used in the field of computer forensics to authenticate the completeness of digital evidence. According to the collision-free nature of hash, any one minor change of strings in function input, the output-strings will be totally diverse. In this paper, we review the hash property and discuss the related applications in computer forensics to enhance the reliability of digital evidence in the investigation of computer crime-events.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信