W
Https://en.wikipedia.org/wiki/Checksum
https://zh.wikipedia.org/wiki/Checksum
A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which May has been introduced during its transmission or storage. It is usually applied to a installation file after it was received from the download server. By themselves, checksums is often used to verify data integrity but is not relied upon to verify data authenticity.
The actual procedure which yields the checksum from a data input is called a checksum function or checksum al Gorithm. Depending on its design goals, a good checksum algorithm would usually output a significantly different value, even for SMA ll changes made to the input. This is especially true of cryptographic hash functions, which could be used to detect many data corruption errors and Verif Y overall data integrity; If the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a Very high probability the data have not been accidentally altered or corrupted.
Checksum functions is related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of the those concepts has different applications and therefore different design goals.
checksum ( English:Checksum) is a form of redundancy check. It is an easy way to check the integrity of data that passes through space (such as communication) or time (such as computer storage) through the error detection method.
The common methods of checksum in computer domain are cyclic redundancy check (CRC), MD5, Sha family and so on.
Checksum a good checksum algorithm typically outputs a significantly different value to the input data for small modifications