Hash Algorithms

Computer Forensics Expert Note: Some hash algorithms include SHA-1 (Secure Hash Algorithm),  MD5 (Message Digest 5),  CRC (Cyclic Redundancy Check).  The SHA-1 hash is the strongest authentication algorithm.  It generates a 160 bit value. The MD5 generates a 128 bits value and the CRC generates either a 32 bit or 64 bit checksum.  A computer forensics examiner, particularly when performing a Virginia computer forensics analysis must remember to always generate a hash value of the physical device and not the hash value of the partition.

This computer forensics information is presented by AVM Technology, LLC, a Computer Forensics, E-Discovery, and Computer Security consulting company located in Richmond, VA and serving clients throughout the United States.