{"_id":"nQrwGXmb7khCPRZrx","bibbaseid":"rasjid-soewito-witjaksono-abdurachman-areviewofcollisionsincryptographichashfunctionusedindigitalforensictools-2017","author_short":["Rasjid, Z. E.","Soewito, B.","Witjaksono, G.","Abdurachman, E."],"bibdata":{"bibtype":"article","type":"article","series":"Discovery and innovation of computer science technology in artificial intelligence era: The 2nd International Conference on Computer Science and Computational Intelligence (ICCSCI 2017)","title":"A review of collisions in cryptographic hash function used in digital forensic tools","volume":"116","issn":"1877-0509","url":"http://www.sciencedirect.com/science/article/pii/S1877050917321221","doi":"10.1016/j.procs.2017.10.072","abstract":"Digital forensic tool is a software used by digital evidence investigators to extract data and information from a digital evidence. The integrity of the digital evidence must be maintained through the chain of custody in order to be admissible in court. Most digital extraction tool use either MD5 (Message Digest) or SHA (Secured Hash Algorithm) hashing to check the integrity of digital evidence. The hashing algorithm has been found to have a weakness known as collision in which two different messages have the same hashing values. Although the probability of producing such weakness is very small, this collision can be used to deny the usage of the evidence in court of justice. After the first collision has been found, many cryptanalysts have tried to explore various methods to detect the collisions with shorter and efficient time. This paper is to review the existing methods in digital forensic tools that have been used to create a collision attacks in digital evidence.","language":"en","urldate":"2020-12-19","journal":"Procedia Computer Science","author":[{"propositions":[],"lastnames":["Rasjid"],"firstnames":["Zulfany","Erlisa"],"suffixes":[]},{"propositions":[],"lastnames":["Soewito"],"firstnames":["Benfano"],"suffixes":[]},{"propositions":[],"lastnames":["Witjaksono"],"firstnames":["Gunawan"],"suffixes":[]},{"propositions":[],"lastnames":["Abdurachman"],"firstnames":["Edi"],"suffixes":[]}],"month":"January","year":"2017","keywords":"MD5, collision, cryptography, digital evidence, digital forensic, hash function","pages":"381–392","bibtex":"@article{rasjid_review_2017,\n\tseries = {Discovery and innovation of computer science technology in artificial intelligence era: {The} 2nd {International} {Conference} on {Computer} {Science} and {Computational} {Intelligence} ({ICCSCI} 2017)},\n\ttitle = {A review of collisions in cryptographic hash function used in digital forensic tools},\n\tvolume = {116},\n\tissn = {1877-0509},\n\turl = {http://www.sciencedirect.com/science/article/pii/S1877050917321221},\n\tdoi = {10.1016/j.procs.2017.10.072},\n\tabstract = {Digital forensic tool is a software used by digital evidence investigators to extract data and information from a digital evidence. The integrity of the digital evidence must be maintained through the chain of custody in order to be admissible in court. Most digital extraction tool use either MD5 (Message Digest) or SHA (Secured Hash Algorithm) hashing to check the integrity of digital evidence. The hashing algorithm has been found to have a weakness known as collision in which two different messages have the same hashing values. Although the probability of producing such weakness is very small, this collision can be used to deny the usage of the evidence in court of justice. After the first collision has been found, many cryptanalysts have tried to explore various methods to detect the collisions with shorter and efficient time. This paper is to review the existing methods in digital forensic tools that have been used to create a collision attacks in digital evidence.},\n\tlanguage = {en},\n\turldate = {2020-12-19},\n\tjournal = {Procedia Computer Science},\n\tauthor = {Rasjid, Zulfany Erlisa and Soewito, Benfano and Witjaksono, Gunawan and Abdurachman, Edi},\n\tmonth = jan,\n\tyear = {2017},\n\tkeywords = {MD5, collision, cryptography, digital evidence, digital forensic, hash function},\n\tpages = {381--392},\n}\n\n","author_short":["Rasjid, Z. E.","Soewito, B.","Witjaksono, G.","Abdurachman, E."],"key":"rasjid_review_2017","id":"rasjid_review_2017","bibbaseid":"rasjid-soewito-witjaksono-abdurachman-areviewofcollisionsincryptographichashfunctionusedindigitalforensictools-2017","role":"author","urls":{"Paper":"http://www.sciencedirect.com/science/article/pii/S1877050917321221"},"keyword":["MD5","collision","cryptography","digital evidence","digital forensic","hash function"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/federico.costantini","dataSources":["ePR8GmkZwWQvyZgvM"],"keywords":["md5","collision","cryptography","digital evidence","digital forensic","hash function"],"search_terms":["review","collisions","cryptographic","hash","function","used","digital","forensic","tools","rasjid","soewito","witjaksono","abdurachman"],"title":"A review of collisions in cryptographic hash function used in digital forensic tools","year":2017}