Chapter 5 Hashing
Chapter 5 Hashing
FORENSIC
CHAPTER FIVE: HASHING
• Hashing
• Hash Function
• Hashing Guideline
• Salting and Peppering
• Hashing characteristics
• Common Hashing algorithms
HASHING
• Hash function should be able to hash in mass with a reasonable limit to prevent
exploitation.
• Hash digest must be dependent on each bit. This will help In creating as many unique
hashes as possible.
• Prevent hash collision. (Collison occurs when there are two exactly same hash
values/digests.
• Salting & Peppering can help prevent collisions.
SALTING
PEPPERING
HASHING CHARACTERISTICS
• Avalanche Effect:
• A small change in the input should result in a significantly different hash value. This property
ensures that similar inputs do not produce similar hash codes.
• Pre-image Resistance:
• It should be computationally infeasible to reverse the hash function and obtain the original
input from its hash value.
• Collision Resistance:
• Collisions occur when two different inputs produce the same hash value. A good hash
function minimizes the likelihood of collisions.
COMMON HASHING ALGORITHMS
• bcrypt:
• bcrypt is a key derivation function designed for securely hashing passwords. It includes a cost factor that adjusts the
computational effort required, making it resistant to brute-force attacks.
• Argon2:
• Argon2 is a password hashing algorithm that won the Password Hashing Competition in 2015. It is designed to be memory-hard
and resistant to GPU and ASIC attacks.
HASHING APPLICATION
• Data Integrity:
• Hashing is used to verify the integrity of data during transmission. If the hash value of the received data matches the
expected hash value, the data is likely intact.
• Password Storage:
• Hash functions are employed to securely store passwords. Instead of storing plaintext passwords, systems store the
hash values. During authentication, the entered password's hash is compared with the stored hash.
• Digital Signatures:
• Hashing is used in digital signatures to create a fixed-size representation of a message that is then encrypted with the
sender's private key. The recipient can verify the signature using the sender's public key.
• Blockchain Technology:
• Blockchain relies heavily on hashing for creating secure and tamper-resistant links between blocks. Each block contains a
hash of the previous block, forming a chain.
HASHING FOR DIGITAL FORENSIC
• Once a file has been hashed, it can be compared with other file hashes.
• A common technique in incident response is to search for a file’s hash value on Google and
determine if the file’s been seen before, and if so what its purpose is.
HASHING FOR DIGITAL FORENSIC
(CONT.…)
• Another technique used in contraband cases is to match a file’s hash value with that of
known contraband images to determine if the file had been seen before.
• In the case of trying to determine if a file is child sexually abusive material, identifying a
file by hash value can help law enforcement prove the images are of a known victim.
• File hashing can also be used to whitelist files based on their signature.
• The white listing process can result in data reduction in a case by removing legitimate
files from a timeline. Doing so runs the risk of removing data from the analyst’s view
because attackers may use legitimate Windows file stopper form their tasks.
SHA1,MD5 HASHING ALGORITHMS