Security Aspects of Piecewise Hashing in Computer Forensics

Details

Serval ID
serval:BIB_2A7C86934A43
Type
Inproceedings: an article in a conference proceedings.
Collection
Publications
Title
Security Aspects of Piecewise Hashing in Computer Forensics
Title of the conference
2011 Sixth International Conference on IT Security Incident Management and IT Forensics
Author(s)
Baier Harald, Breitinger Frank
Publisher
IEEE
ISBN
9781457701467
Publication state
Published
Issued date
05/2011
Language
english
Abstract
Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer forensics is currently very limited. As of today, in a pre-step process hash values of files are generated and stored in a database, typically a cryptographic hash function like MD5 or SHA-1 is used. Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database. This approach has several drawbacks, which have been sketched in the community, and some alternative approaches have been proposed. The most popular one is due to Jesse Kornblum, who transferred ideas from spam detection to computer forensics in order to identify similar files. However, his proposal lacks a thorough security analysis. It is therefore one aim of the paper at hand to present some possible attack vectors of an active adversary to bypass Kornblum’s approach. Furthermore, we present a pseudo random number generator being both more efficient and more random compared to Kornblum’s pseudo random number generator.
Keywords
computer forensics, cryptography, random number generation, computer forensics, piecewise hashing, security analysis, Fuzzy hashing
Create date
06/05/2021 11:01
Last modification date
22/02/2022 19:40
Usage data