Global Information Lookup Global Information

Checksum information


Effect of a typical checksum function (the Unixcksum utility)

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.[1]

The procedure which generates this checksum is called a checksum function or checksum algorithm. Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input.[2] This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.

Checksum functions are related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of those concepts has different applications and therefore different design goals. For instance, a function returning the start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals[clarification needed], see HMAC.

Check digits and parity bits are special cases of checksums, appropriate for small blocks of data (such as Social Security numbers, bank account numbers, computer words, single bytes, etc.). Some error-correcting codes are based on special checksums which not only detect common errors but also allow the original data to be recovered in certain cases.

  1. ^ "Definition of CHECKSUM". www.merriam-webster.com. Archived from the original on 2022-03-10. Retrieved 2022-03-10.
  2. ^ Hoffman, Chris (30 September 2019). "What Is a Checksum (and Why Should You Care)?". How-To Geek. Archived from the original on 2022-03-09. Retrieved 2022-03-10.

and 25 Related for: Checksum information

Request time (Page generated in 0.5554 seconds.)

Checksum

Last Update:

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced...

Word Count : 1197

Internet checksum

Last Update:

The Internet checksum, also called the IPv4 header checksum is a checksum used in version 4 of the Internet Protocol (IPv4) to detect corruption in the...

Word Count : 726

User Datagram Protocol

Last Update:

connection and that UDP doesn't keep track of what it has sent. UDP provides checksums for data integrity, and port numbers for addressing different functions...

Word Count : 2717

Transmission Control Protocol

Last Update:

packets. To assure correctness a checksum field is included; see § Checksum computation for details. The TCP checksum is a weak check by modern standards...

Word Count : 12545

List of hash functions

Last Update:

redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken for a CRC, but it is not: it is a checksum. Hash function...

Word Count : 280

International Article Number

Last Update:

5). The checksum is calculated as sum of products – taking an alternating weight value (3 or 1) times the value of each data digit. The checksum digit is...

Word Count : 2351

Luhn algorithm

Last Update:

total += digit > 9 ? digit - 9 : digit; } int checksum = number.charAt(n - 1) - '0'; return (total + checksum) % 10 == 0; } function luhnCheck(input: number):...

Word Count : 1199

BSD checksum

Last Update:

The BSD checksum algorithm was a commonly used, legacy checksum algorithm. It has been implemented in old BSD and is also available through the sum command...

Word Count : 353

SYSV checksum

Last Update:

The SYSV checksum algorithm was a commonly used, legacy checksum algorithm. It has been implemented in UNIX System V and is also available through the...

Word Count : 200

ICMPv6

Last Update:

The header contains only three fields: type (8 bits), code (8 bits), and checksum (16 bits). type specifies the type of the message. Values in the range...

Word Count : 880

Cyclic redundancy check

Last Update:

code for CRC checksum calculation with many different CRCs to choose from Catalogue of parametrised CRC algorithms CRC Polynomial Zoo Checksum Computation...

Word Count : 5953

IPv4

Last Update:

IANA maintains a list of IP protocol numbers. Header checksum The 16-bit IPv4 header checksum field is used for error checking of the header. When a...

Word Count : 5544

Generic Routing Encapsulation

Last Update:

of the GRE packet header is represented below: C (1 bit) Checksum bit. Set to 1 if a checksum is present. K (1 bit) Key bit. Set to 1 if a key is present...

Word Count : 1296

MD5

Last Update:

function MD4, and was specified in 1992 as RFC 1321. MD5 can be used as a checksum to verify data integrity against unintentional corruption. Historically...

Word Count : 4712

Check digit

Last Update:

Luhn algorithm (1954) Verhoeff algorithm (1969) Damm algorithm (2004) Checksum Casting out nines – similar modular sum check Check bit – binary equivalent...

Word Count : 2379

Network address translation

Last Update:

In this type of NAT, only the IP addresses, IP header checksum, and any higher-level checksums that include the IP address are changed. Basic NAT can...

Word Count : 5642

National identification number

Last Update:

checksum digit is 1, otherwise it is the remainder itself. Example ======= Control = 279146358279 CNP = 1800101221144 ^ checksum digit = 4 Checksum value...

Word Count : 15872

Rolling hash

Last Update:

A rolling hash (also known as recursive hashing or rolling checksum) is a hash function where the input is hashed in a window that moves through the input...

Word Count : 2009

Rsync

Last Update:

check if invoked with --checksum. This forces a full checksum comparison on every file present on both systems. Barring rare checksum collisions, this avoids...

Word Count : 2590

Internet Control Message Protocol

Last Update:

§ Control messages. Code ICMP subtype, see § Control messages. Checksum Internet checksum (RFC 1071) for error checking, calculated from the ICMP header...

Word Count : 2400

Vehicle registration plates of Singapore

Last Update:

small. There was no checksum letter, for example, S. When the checksum letter was implemented, these plate numbers were given checksum letters as well, for...

Word Count : 3789

NMEA 0183

Last Update:

included if a checksum is supplied. The asterisk is immediately followed by a checksum represented as a two-digit hexadecimal number. The checksum is the bitwise...

Word Count : 1241

Matrix 2 of 5

Last Update:

which is calculated as mod 10/3 checksum. Because specification of Matrix 2 of 5 does not require checksum any other checksum types could be used with the...

Word Count : 858

Resident Identity Card

Last Update:

sum % 11) % 11 end puts checksum('34262219840209049') # first 17 digits # => 10 puts checksum('63280119790817003') # => 6 Checksum derivation process in...

Word Count : 2638

Intel HEX

Last Update:

the computed checksum equals the checksum appearing in the record; an error is indicated if the checksums differ. Since the record's checksum byte is the...

Word Count : 6364

PDF Search Engine © AllGlobal.net