During a cybercrime investigation or digital forensic analysis, investigators and examiners are frequently confronted with hash values often used to identify an explicit contraband image, or to provide assurance a forensic image matches the source media. Hash algorithms are used throughout computing and are an important tool in cybercrime investigation and digital forensics. This brief webinar will describe common hash algorithms using in digital forensics, the properties of a hash algorithm, and the impact of hash collisions on the digital forensics.