克隆-哈希算法在数字证据保护中的应用比较分析

Muhammad Nur Faiz
{"title":"克隆-哈希算法在数字证据保护中的应用比较分析","authors":"Muhammad Nur Faiz","doi":"10.35970/infotekmesin.v14i2.1844","DOIUrl":null,"url":null,"abstract":"The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage. \n ","PeriodicalId":33598,"journal":{"name":"Infotekmesin Media Komunikasi Ilmiah Politeknik Cilacap","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence\",\"authors\":\"Muhammad Nur Faiz\",\"doi\":\"10.35970/infotekmesin.v14i2.1844\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage. \\n \",\"PeriodicalId\":33598,\"journal\":{\"name\":\"Infotekmesin Media Komunikasi Ilmiah Politeknik Cilacap\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Infotekmesin Media Komunikasi Ilmiah Politeknik Cilacap\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35970/infotekmesin.v14i2.1844\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infotekmesin Media Komunikasi Ilmiah Politeknik Cilacap","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35970/infotekmesin.v14i2.1844","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网的发展导致了越来越多的网络犯罪。网络犯罪与数字证据密切相关,因此网络犯罪分子倾向于删除、隐藏和格式化所有收集的数据,以消除数字证据的痕迹。这种数字证据在审判中的证明非常重要,因此有必要开发保护数字证据的应用程序。本研究旨在比较克隆和哈希在保护数字证据方面的结果,并评估以Clon Hash application v1为名开发的数字取证应用程序与研究人员常用的应用程序(包括尸检、FTK Imager、md5.exe)在功能、结果和CPU使用方面的性能。所进行的研究结果表明,克隆过程非常成功,哈希值结果与付费应用程序相同,甚至还有其他几个应用程序无法显示哈希值。Clon Hash v1应用程序中的哈希值也不同于其他应用程序中不存在的MD5、SHA1和SHA256。开发的应用程序在功能、结果和CPU使用率方面都更好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage.  
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
30
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信