Join Jungwoo Ryoo for an in-depth discussion in this video Hashing algorithms, part of Learning Computer Forensics.
…Hash algorithms implement hash functions in many different ways.…Some of the well known hash algorithms include MD5,…this is still widely used in computer forensics.…However, it's proven to be vulnerable.…There's another algorithm called, secure hash algorithm, or…a SHA, this is a more secure version of MD5.…There are SHA-1, SHA-2 and SHA-3, which are just different variations of SHA.…There are some known vulnerabilities in hash algorithms.…
This vulnerability is called a collision and there's a very remote possibility of…a collision whenever you're using a hash algorithm.…Collision occurs when two different files produce the same hash value,…although, they use the same hash algorithm.…As you can see in this diagram, file one and file two,…these are two different files but when they go through the same hash algorithm,…sometimes it is possible that you could end up with the same hash value.…This almost never happens but theoretically speaking, this could happen.…
Collisions have been found in both MD5 and SHA.…
- Understanding computer forensics
- Understanding partitioning
- Using a hex editor
- Preparing a target drive
- Acquiring data
- Ensuring data integrity with hashing
- Indexing and searching
- Generating a report
Skill Level Intermediate
Q: Which operating systems support built-in write blocking?
Q: Are there other ways to access deleted files in the usbimage.001 file?
Small Office Networking to Connect, Share, and Printwith Garrick Chow3h 23m Appropriate for all
Heartbleed Tactics for Small IT Shopswith David Gassner16m 39s Beginner
1. Understanding Computer Forensics
2. Preparing for a Computer Forensics Investigation
3. Preserving Data
4. Acquiring Data
5. Analyzing Data
Next steps1m 1s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.