Data authenticity in the context of Checksum


Data authenticity in the context of Checksum

Data authenticity Study page number 1 of 1

Play TriviaQuestions Online!

or

Skip to study material about Data authenticity in the context of "Checksum"


HINT:

👉 Data authenticity in the context of Checksum

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.

The procedure which generates this checksum is called a checksum function or checksum algorithm. Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input. This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.

↓ Explore More Topics
In this Dossier