An Illustration of Hashing and Its Effect on Illegal File Content in the Digital Age
Hoffman Law Office, P.C.; University of Arizona - James E. Rogers College of Law
February 22, 2010
Intellectual Property and Technology Law Journal, Vol. 22, No. 2, April 2010
In this article, I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as discuss that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different hash values. While such a cryptological system is important in authenticating files and ensuring that a given file is the one sought by an internet user, I argue that this system causes numerous problems in tracking internet criminals, and further allows even “newbies” to avoid detection. In conclusion, I state that cryptologists and computer forensics experts need to focus on this as they develop the next generation of hashing algorithms.
Number of Pages in PDF File: 9
Keywords: hashing, md5, sha, hash value, digital fingerprint, music piracy, child pornography
Date posted: March 7, 2010 ; Last revised: May 13, 2014
© 2015 Social Science Electronic Publishing, Inc. All Rights Reserved.
This page was processed by apollo1 in 1.187 seconds