Bay Area Computer Forensics Expert, Investigator & Witness
  • Home
  • Services
    • CLE
    • Intellectual Property Issues
    • Civil Litigation
    • Criminal Defense
  • About Us
    • Jon Berryhill
    • Katie Berryhill
    • Clients
    • Client Testimonials
  • FAQ
    • Hiring A Computer Forensics Expert
    • Resources
  • News
  • Contact
  • Home
  • Services
    • CLE
    • Intellectual Property Issues
    • Civil Litigation
    • Criminal Defense
  • About Us
    • Jon Berryhill
    • Katie Berryhill
    • Clients
    • Client Testimonials
  • FAQ
    • Hiring A Computer Forensics Expert
    • Resources
  • News
  • Contact

News & Computer Forensics Blog

Author Jon Berryhill

Computer Forensics Investigative Expert and Certified Expert Witness for Military, State and Federal Courts

What is a Hash Value?

7/15/2019

13 Comments

 
What is a hash value?
​By Jon Berryhill

If you’
ve encountered a matter involving computer evidence, you may have heard the term “hash value” and wondered what in the world a hash value is. A hash tag “#” (otherwise known as the pound symbol or, originally, an octothorpe), brought to you by Twitter in 2007, is not what this post is about. A hash value and a hash tag are two completely different things. Let’s take a quick dive into this somewhat esoteric term for a critical tool.
 
A hash value is a common feature used in forensic analysis as well as the cryptographic world. The best definition I’ve seen is that a hash is a function that can be used to map data of an arbitrary size onto data of a fixed size. The word “function” is used in its truest form from mathematics. The hash value is the result of the function. Standard hash algorithms are sets of complex but public mathematical steps. There is nothing secret about them.
 
Some people equate a hash value to a fingerprint. It provides a way of identifying and verifying a chunk of digital data. You can have a hash value for a single file, groups of files, or even an entire hard drive. A hash value is a harmless looking string of hexadecimal values, generally 32 to 64 characters long, depending on the hash algorithm used. There is absolutely nothing in a hash value that will tell you anything about what was hashed or how big it was. The way the algorithms work, the length of the hash value is always the same no matter the quantity of the data processed.
 
So what do they look like?


Read More
13 Comments

demonstrated experience . proven results


Home

About

Services

Contact

Berryhill Computer Forensics, Inc.   TX 6-853-249  All Rights Reserved.
Text and content on this site may not be used without written permission.
Copyright © 1997-2024
Photos from anitakhart, cagrimmett, quinn.anya, Robert Couse-Baker, Visual Content