computer
using various softwares. He further admitted that the hash
value is computed to maintain the authenticity and integrity
FIR No. 04/2014, PS Vigilance ... Exhibit-Q1 in sealed
condition from physics division for computation of hash
value and he reported that DVD Exhibit Q1 was found fully
functional
forensic image was
seen to have been authenticated by MD5 Hash (#) value. Hash value
is stated to be a result of a calculation (hash algorithm ... contents. Each hashing algorithm uses a specific number of bytes to
store a thumbprint of the contents. The most common hash value, it
would appear
computer using various softwares. He
further admitted that the hash value is computed to maintain
the authenticity and integrity of the evidence when ... unsealed condition
from physics division for computation of hash value and he
reported that DVD Ex-Q1 was found fully functional and
undamaged and mentioned
inter alia stated to the effect that
the hash value of the questioned voice was not sent to the examining
laboratory ... examiner had also not asked the CBI
to provide the hash value with it further having been stated by the said
witness PW-14 that
drive. However, along with the pen-
drive, its hash value certificate and other details of the pen-
2
drive were not supplied. Accordingly, the petitioner ... same
hash result using the algorithm.”
5. Projecting the above, the learned counsel submits that
the petitioner would suffer prejudice, if the hash value
under IT Act, 2000 .
PW-7 did not calculate any hash value of the data received vide Micro
SD cards or the hash value
Exhibit-Q1 in unsealed condition from physics
division for computation of hash value and he reported that DVD
Exhibit Q1 was found fully functional ... undamaged and
mentioned its MD5 hash value in his report as Ex. PW-2/A.
In his cross-examination, Ld. Defence counsel asked
about
manner using the specialized forensic software "ENCASE" with MD5
hash value. Relating to the assessee, there was a payment entry of an amount ... manner using the
specialized forensic software "ENCASE" with MD5 hash value. The seized
documents revealed that all such illegal payments were took under
that while seizing an electronic
document including creating and providing its hash value and mirror copy at
the relevant point of time, the procedure
alia, as under:-
“4. a. Video footage with the same MD5 Hash value as of
‘rkf.AVI’ could not be retrieved/recovered from the
Digital ... files
bearing the same MD5 hash value are found.
5. This laboratory does not have the facility to compare
and authenticate the Audio and Video