2013
DOI: 10.5120/11723-7433
|View full text |Cite
|
Sign up to set email alerts
|

Establishing the Validity of Md5 and Sha-1 Hashing in Digital Forensic Practice in Light of Recent Research Demonstrating Cryptographic Weaknesses in These Algorithms

Abstract: MD5 and SHA-1 cryptographic hash algorithms are a standard practice in digital forensics that is used in the preservation of digital evidence and ensuring the integrity of the digital evidence. Recent studies have shown that both MD5 and SHA-1 have vulnerabilities and collisions. Based on this, the use of MD5 and SHA-1 hash algorithms in the practice of digital forensics to preserve and ensure the integrity of digital evidence has been questioned in certain instances. Using experimentation, the researcher prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The Bio-Cryptographic [32] [33] had been introduced for two purposes (i) to generate a strong cryptographic key from the biometric features and (ii) to protect the biometric features using strong cryptographic keys. Jain et al [34] had classified the BioCryptosystems into Key Generation and Key Binding where in Key Generation, the biometric key is directly generated from the biometric data [35] while in Key Binding, the biometric template and the secret key are tied up within a cryptographic framework and makes the system impossible to decode the biometric template or the key without any prior knowledge of biometric data [36]. The keys used for encryption and decryption cryptography can be further classified into two types: (i) Symmetric key also known as secret key or private key cryptography where both sender and receiver uses the same key for encryption and decryption and (ii) the Asymmetric key or public key uses one public key and another one private key.…”
Section: Biometric-cryptographymentioning
confidence: 99%
“…The Bio-Cryptographic [32] [33] had been introduced for two purposes (i) to generate a strong cryptographic key from the biometric features and (ii) to protect the biometric features using strong cryptographic keys. Jain et al [34] had classified the BioCryptosystems into Key Generation and Key Binding where in Key Generation, the biometric key is directly generated from the biometric data [35] while in Key Binding, the biometric template and the secret key are tied up within a cryptographic framework and makes the system impossible to decode the biometric template or the key without any prior knowledge of biometric data [36]. The keys used for encryption and decryption cryptography can be further classified into two types: (i) Symmetric key also known as secret key or private key cryptography where both sender and receiver uses the same key for encryption and decryption and (ii) the Asymmetric key or public key uses one public key and another one private key.…”
Section: Biometric-cryptographymentioning
confidence: 99%