This will show you how to understand what the hash function is and how to investigate it in different ways.
What are the most popular hash functions?
- The most common hash functions used in digital forensics are Message Digest 5 (MD5), and Secure Hashing Algorithm (SHA) 1 and 2.
|Hash functions||Provide a brief overview of each one||Example||How big a hash value do they produce? (Digest size /length)|
|Message Digest 5 (MD5)||The MD5, defined in RFC 1321, is a hash algorithm to turn inputs into a fixed 128-bit (16 bytes) length of the hash value. |
MD5 is not collision-resistant – Two different inputs may producing the same hash value
Hash message: 0ea6c58190e34e9a23ccb0de1df8a77d
|Hashing Algorithm (SHA) – 1||a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value. This hash value is known as a message digest. This message digest is usually then rendered as a hexadecimal number which is 40 digits long.||Phrase: Go Steelers!|
Hash message: c924 4cac 47b3 4335 5aed 06f3 cc85 ea82 885f 9f3e
|Hashing Algorithm (SHA) – 2||They are built using the Merkle–Damgård construction, from a one-way compression function itself built using the Davies–Meyer structure from a specialized block cipher.|
It’s a family of functions with different output size
Hash message: 7fdbb09efef10cc600b05f87a838919d73e5ffcabee3525e60c57c0258478b33
|224, 256(SHA-256), 384, or 512 bits|
Subscribe to our email newsletter to get the latest posts delivered right to your email.