Hash Algorithms
- Log in to post comments
Computer Forensics Expert Note: Some hash algorithms include SHA-1 (Secure Hash Algorithm), MD5 (Message Digest 5), CRC (Cyclic Redundancy Check). The SHA-1 hash is the strongest authentication algorithm. It generates a 160 bit value. The MD5 generates a 128 bits value and the CRC generates either a 32 bit or 64 bit checksum. A computer forensics examiner, particularly when performing a Virginia computer forensics analysis must remember to always generate a hash value of the physical device and not the hash value of the partition.
This computer forensics information is presented by AVM Technology, LLC, a Computer Forensics, E-Discovery, and Computer Security consulting company located in Richmond, VA and serving clients throughout the United States.