Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts

Randi Rizal, Ruuhwan Ruuhwan, Septian Chandra


The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.


digital evidence; digital forensics; signature file; investigation process; winhex

Full Text:



Du, X., Le-Khac, N. A., & Scanlon, M. (2017). Evaluation of digital forensic process models with respect to digital forensics as a service. European Conference on Information Warfare and Security, ECCWS, 573–581.

Europol. (2017). Crime in the age of technology. Europol Unclassified - Basic Protection Level.

Harran, M., Farrelly, W., & Curran, K. (2018). A method for verifying integrity & authenticating digital media. Applied Computing and Informatics, 14(2), 145–158.

Khan, M. A., Nasir, A., Ali, M. N., & Farooq, U. (2016). Crime Detection using Digital Forensic Technology. International Journal of Computer Science and Information Security (IJCSIS), 14(10), 487–506.

Maslin, N. M., Consultant, P., & Ltd, S. S. (2018). Impact of Modern Technology. HF Communications:, 3, 33–35.

Noroozi, E., Daud, S. M., & Sabouhi, A. (2015). Secure Digital Signature Schemes based on Hash Functions. International Journal of Computer Engineering and Sciences, 1(1), 27.

Nugis, R. (2018). Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives.

Ramadani, S., Siahaan, A. P. U., Sutrisno, Ritonga, S., Amelia, W. R., Dalimunthe, H., & Munthe, R. (2018). Impact of Cybercrime on Technological and Financial Developments. International Journal For Research in Multidisciplinary Field, 4(10), 341–344.

Riadi, I., Yudhana, A., & Putra, M. C. F. (2018). Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij). Jurnal Teknik Informatika Dan Sistem Informasi, 4(2), 219–227.

Ruuhwan, R., Riadi, I., & Prayudi, Y. (2017). Evaluation of integrated digital forensics investigation framework for the investigation of smartphones using soft system methodology. International Journal of Electrical and Computer Engineering, 7(5), 2806–2817.

Sammes, T., & Jenkinson, B. (2007). Forensic Coputing A Practionier’s Guide.

Sitompul, O. S., Handoko, A., & Rahmat, R. F. (2018). File reconstruction in digital forensic. Telkomnika (Telecommunication Computing Electronics and Control), 16(2), 776–794.

Umar, R., Riadi, I., & Muthohirin, B. F. (2019). Live forensics of tools on android devices for email forensics. Telkomnika (Telecommunication Computing Electronics and Control), 17(4), 1803–1809.

Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. It Journal Research and Development, 3(1), 13–21.



  • There are currently no refbacks.

Copyright (c) 2020 Randi Rizal, Ruuhwan Ruuhwan, Septian Chandra

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Jurnal Informatika Universitas Pamulang (ISSN: 2541-1004 e-ISSN: 2622-4615)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License