Hash Algorithms

Computer Forensics Expert Note: Some hash algorithms include SHA-1 (Secure Hash Algorithm),  MD5 (Message Digest 5),  CRC (Cyclic Redundancy Check).  The SHA-1 hash is the strongest authentication algorithm.  It generates a 160 bit value. The MD5 generates a 128 bits value and the CRC generates either a 32 bit or 64 bit checksum.  A computer forensics examiner, particularly when performing a Virginia computer forensics analysis must remember to always generate a hash value of the physical device and not the hash value of the partition.