Security Aspects of Piecewise Hashing in Computer Forensics
Détails
ID Serval
serval:BIB_2A7C86934A43
Type
Actes de conférence (partie): contribution originale à la littérature scientifique, publiée à l'occasion de conférences scientifiques, dans un ouvrage de compte-rendu (proceedings), ou dans l'édition spéciale d'un journal reconnu (conference proceedings).
Collection
Publications
Institution
Titre
Security Aspects of Piecewise Hashing in Computer Forensics
Titre de la conférence
2011 Sixth International Conference on IT Security Incident Management and IT Forensics
Editeur
IEEE
ISBN
9781457701467
Statut éditorial
Publié
Date de publication
05/2011
Langue
anglais
Résumé
Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer forensics is currently very limited. As of today, in a pre-step process hash values of files are generated and stored in a database, typically a cryptographic hash function like MD5 or SHA-1 is used. Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database. This approach has several drawbacks, which have been sketched in the community, and some alternative approaches have been proposed. The most popular one is due to Jesse Kornblum, who transferred ideas from spam detection to computer forensics in order to identify similar files. However, his proposal lacks a thorough security analysis. It is therefore one aim of the paper at hand to present some possible attack vectors of an active adversary to bypass Kornblum’s approach. Furthermore, we present a pseudo random number generator being both more efficient and more random compared to Kornblum’s pseudo random number generator.
Mots-clé
computer forensics, cryptography, random number generation, computer forensics, piecewise hashing, security analysis, Fuzzy hashing
Site de l'éditeur
Création de la notice
06/05/2021 11:01
Dernière modification de la notice
22/02/2022 19:40