analyzed methods and applications of cryptography in digital forensic investigation, and highlighted differences between these methods. Afterwards, the authors discussed the weaknesses of SHA-1 and approaches to crack SHA-1 in order to highlight the issue of potential clashes in checksum verification and possible effects on related applications.