This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Checksum" – news · newspapers · books · scholar · JSTOR(January 2024) (Learn how and when to remove this message)
Effect of a typical checksum function (the Unixcksum utility)
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.[1]
The procedure which generates this checksum is called a checksum function or checksum algorithm. Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input.[2] This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.
Checksum functions are related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of those concepts has different applications and therefore different design goals. For instance, a function returning the start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals[clarification needed], see HMAC.
Check digits and parity bits are special cases of checksums, appropriate for small blocks of data (such as Social Security numbers, bank account numbers, computer words, single bytes, etc.). Some error-correcting codes are based on special checksums which not only detect common errors but also allow the original data to be recovered in certain cases.
^"Definition of CHECKSUM". www.merriam-webster.com. Archived from the original on 2022-03-10. Retrieved 2022-03-10.
^Hoffman, Chris (30 September 2019). "What Is a Checksum (and Why Should You Care)?". How-To Geek. Archived from the original on 2022-03-09. Retrieved 2022-03-10.
A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced...
The Internet checksum, also called the IPv4 header checksum is a checksum used in version 4 of the Internet Protocol (IPv4) to detect corruption in the...
connection and that UDP doesn't keep track of what it has sent. UDP provides checksums for data integrity, and port numbers for addressing different functions...
packets. To assure correctness a checksum field is included; see § Checksum computation for details. The TCP checksum is a weak check by modern standards...
redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken for a CRC, but it is not: it is a checksum. Hash function...
5). The checksum is calculated as sum of products – taking an alternating weight value (3 or 1) times the value of each data digit. The checksum digit is...
The BSD checksum algorithm was a commonly used, legacy checksum algorithm. It has been implemented in old BSD and is also available through the sum command...
The SYSV checksum algorithm was a commonly used, legacy checksum algorithm. It has been implemented in UNIX System V and is also available through the...
The header contains only three fields: type (8 bits), code (8 bits), and checksum (16 bits). type specifies the type of the message. Values in the range...
code for CRC checksum calculation with many different CRCs to choose from Catalogue of parametrised CRC algorithms CRC Polynomial Zoo Checksum Computation...
IANA maintains a list of IP protocol numbers. Header checksum The 16-bit IPv4 header checksum field is used for error checking of the header. When a...
of the GRE packet header is represented below: C (1 bit) Checksum bit. Set to 1 if a checksum is present. K (1 bit) Key bit. Set to 1 if a key is present...
function MD4, and was specified in 1992 as RFC 1321. MD5 can be used as a checksum to verify data integrity against unintentional corruption. Historically...
In this type of NAT, only the IP addresses, IP header checksum, and any higher-level checksums that include the IP address are changed. Basic NAT can...
checksum digit is 1, otherwise it is the remainder itself. Example ======= Control = 279146358279 CNP = 1800101221144 ^ checksum digit = 4 Checksum value...
A rolling hash (also known as recursive hashing or rolling checksum) is a hash function where the input is hashed in a window that moves through the input...
check if invoked with --checksum. This forces a full checksum comparison on every file present on both systems. Barring rare checksum collisions, this avoids...
§ Control messages. Code ICMP subtype, see § Control messages. Checksum Internet checksum (RFC 1071) for error checking, calculated from the ICMP header...
small. There was no checksum letter, for example, S. When the checksum letter was implemented, these plate numbers were given checksum letters as well, for...
included if a checksum is supplied. The asterisk is immediately followed by a checksum represented as a two-digit hexadecimal number. The checksum is the bitwise...
which is calculated as mod 10/3 checksum. Because specification of Matrix 2 of 5 does not require checksum any other checksum types could be used with the...
the computed checksum equals the checksum appearing in the record; an error is indicated if the checksums differ. Since the record's checksum byte is the...