>>Xelyne+qy
If an encrypted file for which there is no key is treatable as derivative by law, then so should be an md5 hash. Both require vast brute force to extract/establish the original data, but both could be said to contain a derived representation of the work in question.