This document discusses the significance of hash value generation in digital forensics. It describes how hash functions like MD5 and SHA are used to calculate hash values of digital evidence drives in order to verify that the evidence has not been altered by forensic tools or procedures. The document presents six case studies where hash values are generated and verified for a test drive using forensic tools to demonstrate the importance of hash values for validating the integrity of digital evidence.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Cryptography is the science of securing communication and information. It involves encrypting data using mathematical algorithms and decrypting it using keys. The main types of cryptography are symmetric key which uses a shared key for encryption and decryption, and asymmetric or public key which uses separate public and private keys.
RSA is a commonly used public key algorithm. It generates a public and private key pair, where the public key is used to encrypt messages and the private key decrypts them. Digital signatures authenticate messages using public key cryptography and allow message verification through signature validation.
Hash functions are mathematical transformations that map data into fixed size outputs. They are commonly used in digital signatures to hash message contents. Popular hash functions include MD5, SHA
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document discusses enhancing security in mobile ad hoc networks (MANETs) using hash algorithms and a trust-based system. It implements the Zone Routing Protocol in NS2 and adds:
1) HMAC-SHA512, a keyed-hash message authentication code using SHA512, to authenticate and ensure integrity of data transmitted between nodes.
2) A trust-based system to prevent denial-of-service attacks. Nodes are assigned a trust value based on successful transmissions; nodes below a threshold are deemed malicious and isolated.
The paper analyzes how these security features impact network performance metrics like throughput, packet delivery fraction, and end-to-end delay under different scenarios.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
This document presents a new mathematical model for encrypting data using fingerprint data. It works as follows:
1. A fingerprint image is used to generate an encryption key by determining the number of black pixels. This key will be unique for each user.
2. The key is used to generate a very large number to represent each letter or character. Different digits of this number represent different letters.
3. The plaintext is converted to this numerical representation to generate the ciphertext. Additional functions may be applied to further encrypt the ciphertext.
4. To decrypt, the receiver applies the inverse functions and uses the key to determine the letter associated with each number to recover the plaintext. The model is intended to provide highly
IRJET - Hash Functions and its Security for SnagsIRJET Journal
This document provides an overview of cryptographic hash functions, including their structure, properties, and selections in previous research projects. It discusses the Merkle-Damgard and sponge constructions commonly used to design hash functions. The document also summarizes the hash functions evaluated and selected in the NESSIE and CRYPTREC projects, such as Whirlpool, SHA-256, and SHA-512 in NESSIE and MD5, RIPEMD-160, and SHA-1 in CRYPTREC.
Technologies For Appraising and Managing Electronic Recordspbajcsy
This document summarizes technologies for appraising and managing electronic records, including discovering relationships among digital file collections and comparing document versions. It presents three technologies: file2learn to discover relationships between files based on metadata extraction and analysis; doc2learn for comprehensive document comparisons; and Polyglot for automated file format conversion and quality assessment.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Cryptography is the science of securing communication and information. It involves encrypting data using mathematical algorithms and decrypting it using keys. The main types of cryptography are symmetric key which uses a shared key for encryption and decryption, and asymmetric or public key which uses separate public and private keys.
RSA is a commonly used public key algorithm. It generates a public and private key pair, where the public key is used to encrypt messages and the private key decrypts them. Digital signatures authenticate messages using public key cryptography and allow message verification through signature validation.
Hash functions are mathematical transformations that map data into fixed size outputs. They are commonly used in digital signatures to hash message contents. Popular hash functions include MD5, SHA
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document discusses enhancing security in mobile ad hoc networks (MANETs) using hash algorithms and a trust-based system. It implements the Zone Routing Protocol in NS2 and adds:
1) HMAC-SHA512, a keyed-hash message authentication code using SHA512, to authenticate and ensure integrity of data transmitted between nodes.
2) A trust-based system to prevent denial-of-service attacks. Nodes are assigned a trust value based on successful transmissions; nodes below a threshold are deemed malicious and isolated.
The paper analyzes how these security features impact network performance metrics like throughput, packet delivery fraction, and end-to-end delay under different scenarios.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
This document presents a new mathematical model for encrypting data using fingerprint data. It works as follows:
1. A fingerprint image is used to generate an encryption key by determining the number of black pixels. This key will be unique for each user.
2. The key is used to generate a very large number to represent each letter or character. Different digits of this number represent different letters.
3. The plaintext is converted to this numerical representation to generate the ciphertext. Additional functions may be applied to further encrypt the ciphertext.
4. To decrypt, the receiver applies the inverse functions and uses the key to determine the letter associated with each number to recover the plaintext. The model is intended to provide highly
IRJET - Hash Functions and its Security for SnagsIRJET Journal
This document provides an overview of cryptographic hash functions, including their structure, properties, and selections in previous research projects. It discusses the Merkle-Damgard and sponge constructions commonly used to design hash functions. The document also summarizes the hash functions evaluated and selected in the NESSIE and CRYPTREC projects, such as Whirlpool, SHA-256, and SHA-512 in NESSIE and MD5, RIPEMD-160, and SHA-1 in CRYPTREC.
Technologies For Appraising and Managing Electronic Recordspbajcsy
This document summarizes technologies for appraising and managing electronic records, including discovering relationships among digital file collections and comparing document versions. It presents three technologies: file2learn to discover relationships between files based on metadata extraction and analysis; doc2learn for comprehensive document comparisons; and Polyglot for automated file format conversion and quality assessment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
The document proposes a policy-hiding cryptographic scheme for access control in decentralized online social networks that aims to achieve both privacy and performance. Existing DOSNs reveal access policies but some cryptographic variants hide policies at the cost of performance. The proposed scheme uses predicate encryption with a univariate polynomial construction for access policies that drastically improves performance while leaking some policy information. Bloom filters are also used to decrease decryption time and indicate decryptable objects. The goal is to enable privacy-preserving access control without compromising usability in resource-constrained DOSN environments.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
The Thing About Protecting Data Is, You Have To Protect DataAndy LoPresto
This document summarizes a presentation about securing data in NiFi. It discusses common security risks like TLS issues, weak encryption, and data leakage. It provides examples of attacks like cracking encryption using a chosen plaintext attack. It then overview's NiFi's security features like authentication, encryption options, and future plans to enhance protection of configuration values and TLS controls. The overall message is that securing data requires addressing many risks and that NiFi aims to do this through its built-in security features and roadmap.
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
This document proposes a hybrid encryption algorithm for securing data transmission in mobile communications. It combines DES and RSA encryption. DES is used for its higher encryption speed, while RSA is used to distribute keys safely. MD5 digital signatures are also used to guarantee data integrity and authentication. The algorithm encrypts data with DES, encrypts the DES key with RSA, and transmits both along with an MD5 signature to provide dual protection with DES and RSA encryption. This achieves security, confidentiality, integrity and non-repudiation for mobile data transmission.
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
This document summarizes an identity-based group blind signature scheme that allows group members to anonymously sign messages on behalf of the group. The scheme combines the concepts of group signatures and blind signatures. It uses identity-based cryptography where a user's public key can be derived from their identity string, avoiding the need for certificates. The scheme involves setup by a group manager to generate system parameters. Group members obtain private keys from the manager and can then anonymously sign messages that are verifiable as coming from the group. The manager can trace signatures back to individual signers when needed. The scheme aims to provide anonymity, blindness, unforgeability and other security properties through the use of bilinear pairings and cryptographic techniques.
This paper presents an efficient implementation of the RSA encryption algorithm using the GNU MP Library. It describes generating RSA keys with primes of 1024 bits, encrypting and decrypting files by processing characters in groups, and analyzing encryption and decryption times with varying group sizes. It finds that encryption and decryption times decrease when more characters are processed together. A GUI for the RSA implementation is also described and screenshots are provided.
This presentation provides an overview of the initial submission to the OMG RFP on DDS Security. The presentation introduces the overall security model proposed for DDS and the protocols.
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol ijujournal
In this paper, we analyze the security vulnerabilities of SSL-MAP, an ultra-lightweight RFID mutual
authentication protocol recently proposed by Rama N, Suganya R. We present two effective attacks, a desynchronization attack and a full-disclosure attack, against this protocol. The former permanently disables
the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID
reader. The latter completely threats a tag by extracting all the secret information that are stored in the
tag. The de-synchronization attack can be carried out in three round of interaction in SSL-MAP while the
full-disclosure attack is accomplished across several runs of SSL-MAP. We also discuss ways to counter
the attacks.
The document discusses cryptographic hash algorithms and focuses on MD5. It provides a list of hash algorithms and their properties. MD5 is described in detail, including its algorithm, applications, and history of attacks. While formerly widely used, MD5 is now considered broken due to vulnerabilities found in 2004 and 2008. The document concludes by emphasizing the importance of hashing in cryptography and information security.
Cryptography is the process of securing communication and information. It involves encrypting plaintext into ciphertext using algorithms and decrypting the ciphertext back to plaintext. The main goals of cryptography are confidentiality, integrity, non-repudiation, authentication, access control, and availability. There are three main types of cryptographic algorithms - secret key cryptography which uses the same key for encryption and decryption, public key cryptography which uses different keys for encryption and decryption, and hash functions which are one-way functions to encrypt information irreversibly. Common cryptographic hash functions include MD5 and SHA-1 which are used to verify integrity of files and messages.
The document discusses how to build your own solar panels to save thousands of dollars compared to retail prices. It states that you can construct solar panels yourself, avoiding high costs of pre-made panels. The document also briefly mentions learning the secrets of building solar energy systems at home for less money.
Este documento presenta una justificación para la enseñanza del inglés en la educación preescolar y primaria en Colombia debido a la globalización. Describe los objetivos de capacitar a los maestros con estrategias didácticas para iniciar a los estudiantes en el inglés y tener ciudadanos capaces de comunicarse en inglés a niveles internacionales. Explica los estándares básicos de competencia en lenguas extranjeras en inglés y los niveles de desempeño, con enfoque en alcanzar el n
Anda bisa memilik TOYOTA AVANZA, BLACKBERRY GEMINI & YAMAHA MIO jika bergabung bersama CV. MULTI SINERGY INDONESIA. Perusahaan resmi, tidak ada yg diragukan disini. Silahkan hubungi nomor kontak yang ada di website jika Anda ragu. http://www.tantanganavanza.tk
The Professional Martial Arts Instructors in Australiawebmasterjoydeep
Are you looking for a martial arts instructor in your locality? Which martial arts school or class is best suited to you? Get the best instructor and school in Melbourne, Sydney, Canberra, Brisbane, Gold Coast, Perth and other surrounding areas of Australia.
The document discusses how to build your own solar panels and save thousands of dollars compared to retail prices. It states that you can construct solar panels yourself, cutting the costs significantly versus buying pre-made panels from stores. The document also briefly mentions building solar energy and panels in the UK.
This document provides an overview of black history in the United States, including slavery, the Civil War, Jim Crow laws, the Civil Rights Movement, and key events and figures like the Montgomery Bus Boycott. It also analyzes how these topics relate to the novel To Kill a Mockingbird, such as how slavery and Jim Crow laws enabled discrimination, and how the novel depicts the Civil Rights struggle through Atticus Finch's defense of Tom Robinson. The document concludes with biographical details about Harper Lee and the significance of To Kill a Mockingbird to her career as a writer.
The document discusses digital forensic methodologies for investigating a case where an employee downloaded sensitive company data. It proposes using live forensic analysis to gather real-time data from the compromised system. This allows investigators to analyze processes, memory dumps, and network connections to track the data theft. The methodology uses hashing to verify the authenticity and integrity of collected evidence. Computer, network, and database forensics are also discussed as ways to analyze password-protected files, emails, and database entries to identify the stolen data and recover what was lost.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
The document proposes a policy-hiding cryptographic scheme for access control in decentralized online social networks that aims to achieve both privacy and performance. Existing DOSNs reveal access policies but some cryptographic variants hide policies at the cost of performance. The proposed scheme uses predicate encryption with a univariate polynomial construction for access policies that drastically improves performance while leaking some policy information. Bloom filters are also used to decrease decryption time and indicate decryptable objects. The goal is to enable privacy-preserving access control without compromising usability in resource-constrained DOSN environments.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
The Thing About Protecting Data Is, You Have To Protect DataAndy LoPresto
This document summarizes a presentation about securing data in NiFi. It discusses common security risks like TLS issues, weak encryption, and data leakage. It provides examples of attacks like cracking encryption using a chosen plaintext attack. It then overview's NiFi's security features like authentication, encryption options, and future plans to enhance protection of configuration values and TLS controls. The overall message is that securing data requires addressing many risks and that NiFi aims to do this through its built-in security features and roadmap.
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
This document proposes a hybrid encryption algorithm for securing data transmission in mobile communications. It combines DES and RSA encryption. DES is used for its higher encryption speed, while RSA is used to distribute keys safely. MD5 digital signatures are also used to guarantee data integrity and authentication. The algorithm encrypts data with DES, encrypts the DES key with RSA, and transmits both along with an MD5 signature to provide dual protection with DES and RSA encryption. This achieves security, confidentiality, integrity and non-repudiation for mobile data transmission.
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
This document summarizes an identity-based group blind signature scheme that allows group members to anonymously sign messages on behalf of the group. The scheme combines the concepts of group signatures and blind signatures. It uses identity-based cryptography where a user's public key can be derived from their identity string, avoiding the need for certificates. The scheme involves setup by a group manager to generate system parameters. Group members obtain private keys from the manager and can then anonymously sign messages that are verifiable as coming from the group. The manager can trace signatures back to individual signers when needed. The scheme aims to provide anonymity, blindness, unforgeability and other security properties through the use of bilinear pairings and cryptographic techniques.
This paper presents an efficient implementation of the RSA encryption algorithm using the GNU MP Library. It describes generating RSA keys with primes of 1024 bits, encrypting and decrypting files by processing characters in groups, and analyzing encryption and decryption times with varying group sizes. It finds that encryption and decryption times decrease when more characters are processed together. A GUI for the RSA implementation is also described and screenshots are provided.
This presentation provides an overview of the initial submission to the OMG RFP on DDS Security. The presentation introduces the overall security model proposed for DDS and the protocols.
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol ijujournal
In this paper, we analyze the security vulnerabilities of SSL-MAP, an ultra-lightweight RFID mutual
authentication protocol recently proposed by Rama N, Suganya R. We present two effective attacks, a desynchronization attack and a full-disclosure attack, against this protocol. The former permanently disables
the authentication capability of a RFID tag by destroying synchronization between the tag and the RFID
reader. The latter completely threats a tag by extracting all the secret information that are stored in the
tag. The de-synchronization attack can be carried out in three round of interaction in SSL-MAP while the
full-disclosure attack is accomplished across several runs of SSL-MAP. We also discuss ways to counter
the attacks.
The document discusses cryptographic hash algorithms and focuses on MD5. It provides a list of hash algorithms and their properties. MD5 is described in detail, including its algorithm, applications, and history of attacks. While formerly widely used, MD5 is now considered broken due to vulnerabilities found in 2004 and 2008. The document concludes by emphasizing the importance of hashing in cryptography and information security.
Cryptography is the process of securing communication and information. It involves encrypting plaintext into ciphertext using algorithms and decrypting the ciphertext back to plaintext. The main goals of cryptography are confidentiality, integrity, non-repudiation, authentication, access control, and availability. There are three main types of cryptographic algorithms - secret key cryptography which uses the same key for encryption and decryption, public key cryptography which uses different keys for encryption and decryption, and hash functions which are one-way functions to encrypt information irreversibly. Common cryptographic hash functions include MD5 and SHA-1 which are used to verify integrity of files and messages.
The document discusses how to build your own solar panels to save thousands of dollars compared to retail prices. It states that you can construct solar panels yourself, avoiding high costs of pre-made panels. The document also briefly mentions learning the secrets of building solar energy systems at home for less money.
Este documento presenta una justificación para la enseñanza del inglés en la educación preescolar y primaria en Colombia debido a la globalización. Describe los objetivos de capacitar a los maestros con estrategias didácticas para iniciar a los estudiantes en el inglés y tener ciudadanos capaces de comunicarse en inglés a niveles internacionales. Explica los estándares básicos de competencia en lenguas extranjeras en inglés y los niveles de desempeño, con enfoque en alcanzar el n
Anda bisa memilik TOYOTA AVANZA, BLACKBERRY GEMINI & YAMAHA MIO jika bergabung bersama CV. MULTI SINERGY INDONESIA. Perusahaan resmi, tidak ada yg diragukan disini. Silahkan hubungi nomor kontak yang ada di website jika Anda ragu. http://www.tantanganavanza.tk
The Professional Martial Arts Instructors in Australiawebmasterjoydeep
Are you looking for a martial arts instructor in your locality? Which martial arts school or class is best suited to you? Get the best instructor and school in Melbourne, Sydney, Canberra, Brisbane, Gold Coast, Perth and other surrounding areas of Australia.
The document discusses how to build your own solar panels and save thousands of dollars compared to retail prices. It states that you can construct solar panels yourself, cutting the costs significantly versus buying pre-made panels from stores. The document also briefly mentions building solar energy and panels in the UK.
This document provides an overview of black history in the United States, including slavery, the Civil War, Jim Crow laws, the Civil Rights Movement, and key events and figures like the Montgomery Bus Boycott. It also analyzes how these topics relate to the novel To Kill a Mockingbird, such as how slavery and Jim Crow laws enabled discrimination, and how the novel depicts the Civil Rights struggle through Atticus Finch's defense of Tom Robinson. The document concludes with biographical details about Harper Lee and the significance of To Kill a Mockingbird to her career as a writer.
The document discusses digital forensic methodologies for investigating a case where an employee downloaded sensitive company data. It proposes using live forensic analysis to gather real-time data from the compromised system. This allows investigators to analyze processes, memory dumps, and network connections to track the data theft. The methodology uses hashing to verify the authenticity and integrity of collected evidence. Computer, network, and database forensics are also discussed as ways to analyze password-protected files, emails, and database entries to identify the stolen data and recover what was lost.
Computer forensics is a very important branch of computer science in relation to computer and Internet related crimes. Earlier, computers were only used to produce data but now it has expanded to all devices related to digital data. The goal of Computer forensics is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime.
For better research and investigation, developers have created many computer forensics tools. Police departments and investigation agencies select the tools based on various factors including budget and available experts on the team.
DIGITAL INVESTIGATION USING HASHBASED CARVINGIJCI JOURNAL
File carving is a popular method used for digital investigations for detecting the presence of specific target
files on digital media. Hash based sector hashing helps to identify the presence of a target file. The hashes
of physical sectors of the media is compared to the database of hashes created by hashing every block of
the target files. To enable this, instead of evaluating the hashes of entire files, the hashes of individual data
blocks is used for evaluation. Hash-based carving helps to identify fragmented files, files that are
incomplete or that have been partially modified. To address the problem of High false identification rate
and non-probative blocks, a HASH-SETS algorithm that can help in identification of files and the HASHRUNS
algorithm that helps in reassembling the files is used. This technique is demonstrated using the
forensic tool: bulk_extractor along with a hash database: the has hdb and an algorithm implementation
written in Python
Forensic examiners are in an uninterrupted battle with criminals for the use of Hadoop Platform. Thus, forensic investigation on composite Hadoop Platforms is an emerging field for forensic practitioners. The major challenge to this environment is generating the effective evidence from a sheer amount of Hadoop backlogs which awaiting analysis to embody the criminal activity. As a consequence, it may be arduously time and resources consuming to extract the evidences from a significant amount of backlogs. In order to address the above challenges in generating evidences, forensic readiness can assist the forensic practitioners in powerful forensic works. This paper undertakes the forensic research with two folds of contribution; (i) it finds out the forensically important artifacts on Hadoop Platform: Non-Ambari Hortonworks Data Platform (HDP), (ii) forensic readiness is proposed by means of analysis to those residual artifacts. The outcomes of this paper contribute to a Hadoop Platform forensic readiness which can result in effective evidence generating in real-world forensics on Hadoop Platform.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the need for a new secure hash standard. It describes how hash functions work by condensing arbitrary messages into fixed-size message digests. The properties of preimage resistance, second preimage resistance, and collision resistance are explained. Common hashing algorithms like MD5, SHA-1, and SHA-2 are outlined along with vulnerabilities like birthday attacks. The document concludes by noting the need to replace standards like MD5 and SHA-1 due to successful cryptanalysis attacks.
This document discusses cryptographic hash functions. It provides an overview of hash functions and their properties like producing a fixed-length digest from an arbitrary-length message. Common hash functions like MD5, SHA-1, and SHA-2 are described along with attacks against them. The need for a new secure hash standard, SHA-3, is explained due to weaknesses found in earlier standards like MD5 and SHA-1. The timeline and process for the SHA-3 competition to select a new standard by 2012 is summarized.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the need for a new secure hash standard. Hash functions take an arbitrary-length message and condense it to a fixed length digest. They are used for applications like file integrity verification, password storage, and digital signatures. Key properties include producing fixed length outputs, and being preimage, second preimage, and collision resistant. Common hash functions like MD5 and SHA-1 have been broken or are becoming vulnerable to attacks. This highlights the need for a new secure hash standard with stronger security.
This document discusses cryptographic hash functions. It provides an overview of hash functions and their properties like producing a fixed-length digest from an arbitrary-length message. Common hash functions like MD5, SHA-1, and SHA-2 are described along with attacks against them. The need for a new secure hash standard, SHA-3, is explained due to weaknesses found in earlier standards like MD5 and SHA-1. The timeline and process for the SHA-3 competition to select a new standard by 2012 is summarized.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the development of standards. Hash functions take an arbitrary-length message and generate a fixed-length digest. They are used for applications like file integrity verification, password storage, and digital signatures. Key properties include producing the same hash for identical messages, being preimage and second preimage resistant, and collision resistant. Common hash functions include MD5, SHA-1, SHA-2, and RIPEMD, with NIST developing new standards like SHA-3 due to attacks on older functions.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the development of standards. Hash functions take an arbitrary-length message and generate a fixed-length digest. They are used for applications like file integrity verification, password storage, and digital signatures. Key properties include producing the same hash for identical messages, and being preimage and collision resistant. Common hash functions are based on the Merkle-Damgard structure and use compression functions. Attacks like birthday attacks aim to find collisions by processing many messages. Due to attacks on MD5 and concerns about SHA-1, NIST is developing a new secure hash standard called SHA-3.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the need for a new secure hash standard. Hash functions take an arbitrary-length message and condense it to a fixed length digest. They are used for applications like file integrity verification, password storage, and digital signatures. Key properties include producing fixed length outputs, being preimage resistant (one-way), and collision resistant. Common hash functions like MD5 and SHA-1 have been broken or shown to be vulnerable to attacks. This highlights the need for a new secure hash standard with stronger security.
This document is a report on cyber and digital forensics submitted by three students from G.H. Raisoni College of Engineering in Nagpur, India. The report discusses digital forensic methodology, tools used in digital analysis like Backtrack and Nuix, techniques such as live analysis and analyzing deleted files, analyzing USB device history from the Windows registry, and concludes that digital forensics is an evolving field with no set standards yet and constant updates are needed to investigate modern cyber crimes.
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
- This is my first article, its for my Final Year Project for Bachelor's of Computer Science (Systems and Networking)
- It also will be uploaded into CyberSecurity Malaysia E-Bulletin for 2017
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
Many industries have made widespread use of the handwittern signature verification system, including banking, education, legal proceedings, and criminal investigation, in which verification and identification are absolutely necessary. In this research, we have developed an accurate offline signature verification model that can be used in a writer-independent scenario. First, the handwitten signature images went through four preprocessing stages in order to be suitable for finding the unique features. Then, three different types of features namely principal component analysis (PCA) as appearance-based features, gray-level co-occurrence matrix (GLCM) as texture-features, and fast Fourier transform (FFT) as frequency-features are extracted from signature images in order to build a hybrid feature vector for each image. Finally, to classify signature features, we have designed a proposed fast hyper deep neural network (FHDNN) architecture. Two different datasets are used to evaluate our model these are SigComp2011, and CEDAR datasets. The results collected demonstrate that the suggested model can operate with accuracy equal to 100%, outperforming several of its predecessors. In the terms of (precision, recall, and F-score) it gives a very good results for both datasets and exceeds (1.00, 0.487, and 0.655 respectively) on Sigcomp2011 dataset and (1.00, 0.507, and 0.672 respectively) on CEDAR dataset.
This document proposes a new approach called the Count based Secured Hash Algorithm. It introduces a new parameter β that represents the number of bits rotated to the right in the preprocessing step, which depends on the count of 1s in the input message. This increases security compared to traditional SHA algorithms where the rotation is fixed. It modifies the SHA-256, SHA-384 and SHA-512 functions by replacing the fixed rotation with a rotation based on the count. The algorithm has higher time complexity but provides better security by making the digest dependent on the message content through the count variable.
The document discusses forensic tools for Mac OS and Linux operating systems. It compares tools like Network Miner and NMAP to Hex Workshop and validates them based on software verification and validation. It also demonstrates exploring different file formats like Excel, Word, JPEG, GIF and MOV in the Hex Editor Hxd.
Internet Relay Chat, or IRC, is a protocol that allows users that connect to Internet Relay Chat Servers to have conversation with others in real time. Users connect to IRC Servers using an IRC Client. Commercial chat client’s like yahoo! and google chat are quite popular in wide use. To other chat clients were worth exploring. These tools are arguably better suited for criminal activity. IRC is one such tool. There are basically two options available to investigators involved in an IRC occurrence. They can look at log files on servers or clients or they can monitor transmission directly. In this paper we have been using X Chat application for the IRC Forensic Investigation. We capture the IRC Client’s packets and analyze that packets.
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfuzair
Linux provides a vast range of forensic analysis tools that can be used to conduct digital investigations. The use of these tools is crucial to ensure the
integrity of the evidence collected and to maintain the chain of custody. Acquiring evidence, analyzing it, and reporting on the findings are the three main steps of a digital investigation. In this article, we have covered how to use Linux forensic analysis tools for each of these steps.
Linux forensic analysis tools provide a powerful and cost-effective solution for digital investigations. These tools are regularly updated to keep up with the latest technology and techniques. However, it is important to note that the use of these tools requires a high level of expertise and knowledge in digital forensics.
In summary, Linux forensic analysis tools are an essential part of digital investigations, and their use is becoming increasingly important as digital data continues to play a crucial role in legal proceedings. With the right expertise and knowledge, these tools can be used to acquire, analyze, and report on electronic evidence in a reliable and secure manner.
FAQs
What is a digital investigation? A digital investigation is the process of collecting, analyzing, and reporting on electronic data to uncover facts that can be used in legal proceedings.
What are Linux forensic analysis tools? Linux forensic analysis tools are a collection of software tools used to acquire, analyze, and report on electronic evidence in a digital investigation.
What are the benefits of using Linux forensic analysis tools? Linux forensic analysis tools provide a cost-effective and powerful solution for digital investigations. They are regularly updated to keep up with the latest technology and techniques.
Are Linux forensic analysis tools difficult to use? The use of Linux forensic analysis tools requires a high level of expertise and knowledge in digital forensics. However, with the right expertise, these tools can be used effectively to acquire, analyze, and report on electronic evidence.
Can Linux forensic analysis tools be used in legal proceedings? Yes, Linux forensic analysis tools can be used in legal proceedings to provide evidence in a case. However, it is important to ensure that the evidence collected is reliable, secure, and admissible in court.
Linux provides a vast range of forensic analysis tools that can be used to conduct digital investigations. The use of these tools is crucial to ensure the
integrity of the evidence collected and to maintain the chain of custody. Acquiring evidence, analyzing it, and reporting on the findings are the three main steps of a digital investigation. In this article, we have covered how to use Linux forensic analysis tools for each of these steps.
Linux forensic analysis tools provide a powerful and cost-effective solution for digital investigations. These tools are regularly updated to keep up with the latest technology and techniques. However, it is important to
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer and it is the role of the investigator to check whether the crime or policy violation has been committed by the suspect. Investigators use various kinds of tools based on the area or the kind of information which is lost such as digital data, network compromise, cyber breach, web data, email and many more. Varun H M | Dr. Uma Rani Chellapandy | Srividya B G "Comparative Analysis of Digital Forensic Extraction Tools" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd37980.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37980/comparative-analysis-of-digital-forensic-extraction-tools/varun-h-m
Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
IJERD (www.ijerd.com) International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 5 (July 2012), PP. 64-70
Significance of Hash Value Generation in Digital Forensic: A
Case Study
Kailash Kumar1, Sanjeev Sofat2, S.K.Jain3, Naveen Aggarwal4
1
PhD (CSE) Student, PEC University of Technology, Chandigarh, India
2
Prof. and Head CSE Deptt. PEC University of Technology, Chandigarh, India
3
Deputy Director (Ball.) CFSL, Chandigarh, India
4
Assistant Professor CSE Deptt. UIET, Chandigarh, India
Abstract––Digital forensics tools frequently use to calculate the hash value of digital evidence drive. MD5 and SHA
hash function is used in digital forensic tools to calculate and verify that a data set has not been altered, due to the
application of various evidence collection and analysis tools and procedures. Additionally, due to the impact on the
personal life of the subject of an investigation, verification of the correct operation of tools and procedures is critical.
This paper discusses the significance of hash value in digital forensic for the digital evidence. The research conducts six
possible different cases as an experiment to generate and verify the hash value of test drive using forensic tool to
demonstrate the importance of hash value in digital forensic. Additionally, unreliable results can be obtained because of
the improper use of the application of the tools.
Keywords––MD5; SHA; digital forensic; hash function.
I. INTRODUCTION
The field of digital forensic analysis has experienced rapid growth in recent years, as the use of computer forensic
analysis proved invaluable in a wide range of legal proceedings. Digital forensics is used not only to investigate
computerized crimes, such as network intrusion, fabrication of data and illegitimate material distribution through digital
services, but also to investigate crime where evidence is stored in any digital format on any digital device [1]. One of the
most important steps performed during a digital forensics investigation is the data acquisition step, which is “the task of
collecting digital evidence from electronic media” [6]. During this step, the investigator makes an exact copy of the
evidence disk or file to produce a forensics copy. To avoid destroying evidence, the investigation is conducted on the
forensic copy, rather than the original evidence data.
Thus, any data corruption that occurs during the investigation process can be rectified by using the evidence disk
to create a new forensic copy to use to continue the investigation. Because a digital investigation frequently yields results
that are used in a criminal or civil court proceeding which can drastically affect a person life, the investigator must be
completely certain that the forensic copy is an exact copy of the evidence.
The hash value plays an important role in forensic investigation for proving accuracy of digital data in front of
judiciary. In this research article we are proposing some real time case study to prove the importance of hash value in digit al
forensic investigation process.
The remainder of this paper is organized as follows. Section 2 gives an overview of digital forensics. Section 3
provides a short background on hash function. Section 4 focuses on some case study of hash value generated in digital hard
drive for forensic point of view. Finally section 5 concludes the paper and our future work.
II. DIGITAL FORENSIC SCIENCE
The use of scientifically derived and proven methods toward the preservation, collection, validation, identification,
analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of
facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions
shown to be disruptive to planned operations. In 2001, the Digital Forensics Research Workshop [DFRW] [3] proposed a
process for digital investigations that involves the following six steps. In this time we are more concern about the analysis
phase, hash analysis is also a part of whole digital analysis that we mention in the original DFRW model illustrates in fig 1.
Identification Preservation Collection
evidence
Presentation Analysis Examination
Hash Analysis
Fig. 1. Digital forensic investigation process
64
2. Significance of Hash Value Generation in Digital Forensic: A Case Study
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has
been stored in the digital electronic storage devices to be used in a court of law [1, 4, 5].
III. HASH FUNCTION
Definition: An algorithm that turns a variable-sized amount of text into a fixed-sized output (hash value). Hash functions are
used in creating digital signatures, hash tables and short condensations of text for analysis purposes. Hash functions are also
known as "cryptographic hash functions.
A hash function H is a transformation that takes a variable-size input „m‟ and returns a fixed-size string, which is
called the hash value h (that is, h = H(m)).
Hash functions with just this property have a variety of general computational uses, but when employed in
cryptography the hash functions are usually chosen to have some additional properties.
The basic requirements for a cryptographic hash function are:
the input can be of any length,
the output has a fixed length,
H(x) is relatively easy to compute for any given x ,
H(x) is one-way,
H(x) is collision-free.
A hash function H is said to be one-way if it is hard to invert, where "hard to invert" means that given a hash value
h, it is computationally infeasible to find some input x such that H(x) = h.
If, given a message x, it is computationally infeasible to find a message y not equal to x such that H(x) = H(y) then H i s said
to be a weakly collision-free hash function.
A strongly collision-free hash function H is one for which it is computationally infeasible to find any two
messages x and y such that H(x) = H(y).
The hash value represents concisely the longer message or document from which it was computed; one can think
of a message digest as a "digital fingerprint" of the larger document. Perhaps the main role of a cryptographic hash function
is in the provision of digital signatures. Since hash functions are generally faster than digital signature algorithms, it is
typical to compute the digital signature to some document by computing the signature on the document's hash value, which
is small compared to the document itself. Additionally, a digest can be made public without revealing the contents of the
document from which it is derived. This is important in digital time stamping where, using hash functions, one can get a
document time stamped without revealing its contents to the time stamping service.
A. Practical Hash Function
This section covers hash functions that are most likely used in digital forensic software/tools: MD5 and SHA-1.
For their detailed description we refer the reader to the documents issued by standardization bodies.
MD4 and MD5:MD4 was proposed by Ron Rivest in 1990 and MD5 [7] followed shortly thereafter as its stronger version.
Their design-had great influence on subsequent constructions of hash function. The letters “MD” stands for “message digest”
and the numerals refer to the functions being the fourth and fifth designs from the same hash-function family.
SHA-0 and SHA-1: The Secure Hash Algorithm (SHA) was initially approved for use with the Digital Signature Standard
(DSS) in 1993 [2]. Two years later the standard was updated to become what is currently known as SHA-1 [8]. The first
version of SHA is referred in the cryptographic literature as SHA-0, although it has never been its official designation. SHA-
1 differs from SHA-0 by exactly one additional instruction, which is nonetheless extremely important from the cryptanalytic
perspective. Since there were no reasons to prefer the initial version of the standard, SHA-1 replaced SHA-0 in all but most
antiquated applications. The details of these hash function is briefly illustrates in table 1below.
Table1. Practical Hash function
Name Block Size(bits) Word Size(bits) Output Size(bits) Rounds
MD4 512 32 128 48
MD5 512 32 128 64
SHA-0 512 32 160 80
SHA-1 512 32 160 80
B. Hash value generation in digital forensic
Generally hash value is used to check the integrity of any data file but, in digital forensic it is used to check the
integrity of evidence disk data. The image of a disk is created in digital forensic for analysis so, it is necessary the image
have exactly or replica of evidence disk. The hash value generated during imaging should match when that image of
evidence disk is extracted for detail analysis. In digital forensic hash value is generated for whole disk data not only single or
multiple files.
65
3. Significance of Hash Value Generation in Digital Forensic: A Case Study
The hash value generated using forensic tools in the form of hexadecimal notation. Here we are giving an example
to convert it in too two easily understandable form for forensic practitioner who don‟t have enough knowledge about
computer system.
Using the hash value generated of case1: 79EAB87F0D3A3B45954779A72F79AE63
1. Table 2 shows the binary form of the given hexadecimal value:
Table2. Binary code for Hash value
0111 1001 1110 1010 1011 1000 0111
7 9 E A B 8 7
1111 0000 1101 0011 1010 0011 1011
F 0 D 3 A 3 B
0100 0101 1001 0101 0100 0111 0111
4 5 9 5 4 7 7
1001 1010 0111 0010 1111 0111 1001
9 A 7 2 F 7 9
1010 1110 0101 0011
A E 6 3
2. The following steps involve to convert given hexadecimal hash value into decimal form:
Step1. Use Hexadecimal to Decimal conversion process as given below:
7*1631 + 9*1630 +E*1629+A*1628 +………….6*161 +3*160
Step2. Substitutes the equivalent numerical value in place of alphabet in hexadecimal hash value as given below.
A=10, B=11, C=12, D=13, E=14, F=15
After substitution:
7*1631 + 9*1630 +14*1629+10*1628 +…….6*161 +3*160
Step3. Calculate hash value in decimal form.
IV. PROPOSED FRAMEWORK FOR HASH VALUE CALCULATION
The experimental model/framework for hash value calculation in digital forensic is proposed in fig 2. Using this
model the test data has been generated on digital hard drive. Finding evidence for system tampering, data hiding or deleting
utilities, unauthorized system modifications etc. should also be performed. Detecting and recovering hidden or obscured
information is a major tedious task involved. Data should be searched thoroughly for recovering passwords, finding unusual
hidden files or directories, file extension and signature mismatches etc. while searching the above said information from an
evidence disk the forensic software is also create the hash value of the whole drive to check the integrity of the disk. In
forensic data acquisition phase the hash value is generated at the time of imaging the evidence disk and compare that hash
value at the time of examination or copying the contents of the disk. If both the hash value is identical than the forensic
expert assume everything is fine otherwise some kind of tampering is involved with the evidence disk. Here the case study
focuses the importance of hash value in forensic examination has been explored.
Evidence disk
Write Blocker
Forensic tool
Acquisition
hash
Verification
hash
Presentation
Fig. 2. Hash calculation model
66
4. Significance of Hash Value Generation in Digital Forensic: A Case Study
The model is used to create an image of test hard drive connected with write blocker (Ex. Fast Blok), to avoid
writing anything by any vulnerable program running on the system. We can use any forensic tool for creating disk image
along with hash value. The Encase forensics [9] is a simple but concise tool used in this case study. It saves an image of a
hard disk in one file or in segments that may be later on reconstructed. It calculates MD5 hash values and confirms the
integrity of the data before closing the files. Now the raw image created by Encase program is used for analysis and
examination purpose. While extracting data from raw image the Encase program also verifies previous generated hash value
and creates summary/report for forensic validation and presentation that match finds.
The importance of hash value in digital forensic is illustrates in six different cases has been generated and analyzed
below.
1. CASE1. Compute hash value in original: Here we generate hash value of original test evidence disk, which contains
some suspect files/data for forensic analysis and also verifies the hash value after imaging/acquisition, report shown below in
figure 3.
Fig. 3. Case1 report
2. CASE2. Add any file in test drive and check hash with original: In this case the experiments generated the report
shown in fig 4. The impact of adding any file in the test drive by mistake or by concern, correspondingly the hash value is
verified with the original. The hash value differs from the original/actual evidence drive.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: DE9EAD6A3B7B02475ADB6EB83CCB2826
Fig. 4. Case2 report
3. CASE3. Remove any file from the test drive and compare hash with original: In this case the experiments illustrate if
any single or multiple files deleted from the evidence disk, correspondingly hash value of the drive is generated and compare
with original. The difference of hash value generated report is shown in fig 5.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: ECB15214986D91DF876F2F773F9E0F4D
67
5. Significance of Hash Value Generation in Digital Forensic: A Case Study
Fig. 5. Case3 report
4 CASE4. Modify any file:
This case is totally differing from the previous two cases of add and remove files from the drive, describes in two sub cases
below:
Case 4.1. Add some contents in any file and check hash with original: Here we are demonstrates the case when
small amount of data is added in any file. The report generated with hash value shows in fig 6. The comparison of
hash value with the original is also mention below.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: E02365F1BFCCA37AAB5E62D6262EBADE
Fig. 6. Case4.1 report
Case 4.2. Remove some contents from any file and compare hash with original: Here we are demonstrates the
case when some portion of data is erased from any file. The generated report with hash value shown in fig 7 below.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: 43D25B68F22A84CD95C5214F0414E511
68
6. Significance of Hash Value Generation in Digital Forensic: A Case Study
Fig. 7. Case4.2 report
5. CASE5. Shifting some contents from one file to another and check hash with original: Sometimes the content of one
file is shifted to another file rather than the whole file the results of hash value comparison with original shows in figure 8
below.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: 593026F4FB3437E7D47FC4178F22EC92
Fig. 8. Case5 report
6. CASE6. Update some contents in existing file and compare hash: The case is related where financial and accounting
data is much more valuable than other contents of the disk. Sometimes the suspect modified only numerical contents of the
data files. The experiments demonstrate here is to check whether the hash value generated in forensic tool differ or match
with any previous case shows in figure 9 below.
Original hash value: 79EAB87F0D3A3B45954779A72F79AE63
New hash value: C6D351D5F05CC6273EBD153FC25B5E7B
69
7. Significance of Hash Value Generation in Digital Forensic: A Case Study
Fig. 9. Case6 report
V. CONCLUSION & FUTURE WORK
The role of hash value is demonstrated in this research work with the help of different cases involved in data
tampering is analyzed and verified. The focus of this research is strongly on the hash value of whole digital drive not a single
file. The aim of this work to show that even if a small modification happen in digital evidence, detected in the hash value.
Given a different heuristic, it would be interesting to apply this technique in future to other file systems other than
that of Windows and to compare results.
VI. ACKNOWLEDGMENT
The authors thankful to Mr. Vivek Kumar Forensic Analyst Central Forensic Science Laboratory, Chandigarh, for
their useful contribution and Software/Hardware support for this case study.
REFERENCES
[1]. S. Ardisson. Producing a Forensic Image of Your Client‟s Hard Drive? What You Need to Know, Qubit, 1, pp. 1-2, 2007.
[2]. “Digital signature standard,” FIPS PUB 186-2, 2000. Available from: www.csrc.nist.gov/publications/fips/fips186-2/fips186-2-
change1.pdf
[3]. G. Palmer. A road map for digital forensic research. Report From the First Digital Forensic Research Workshop (DFRWS),
August 2001.
[4]. M. Alazab, S. Venkatraman & P. Watters. Digital forensic techniques for static analysis of NTFS images, Proceedings of
ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore, 2009.
[5]. M. Reith, C. Carr, & G. Gunsch. An examination of digital forensic models, International Journal of Digital Evidence, 1, pp.1-
12, 2002.
[6]. Nelson, B. Phillips, A. Enfinger, F. Steuart, C. Guide to Computer Forensics and Investigations: Third Edition, Course
Technology, 2008.
[7]. Ronald L. Rivest. The MD5 message-digest algorithm, IETF RFC 1321, 1992. Available from www.ietf.org/rfc/rfc1321.txt
[8]. Secure hash standard, FIPS PUB 180-1, 1995. Available from: www.itl.nist.gov/fipspubs/fip180-1.htm
[9]. Guidance Software Inc. Encase forensics. http://www.guidancesoftware.com.
70