enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. cksum - Wikipedia

    en.wikipedia.org/wiki/Cksum

    cksum is a command in Unix and Unix-like operating systems that generates a checksum value for a file or stream of data. The cksum command reads each file given in its arguments, or standard input if no arguments are provided, and outputs the file's 32-bit cyclic redundancy check (CRC) checksum and byte count. [1]

  3. sha1sum - Wikipedia

    en.wikipedia.org/wiki/Sha1sum

    It is commonly used to verify the integrity of files. It (or a variant) is installed by default on most Linux distributions. Typically distributed alongside sha1sum are sha224sum, sha256sum, sha384sum and sha512sum, which use a specific SHA-2 hash function and b2sum, [1] which uses the BLAKE2 cryptographic hash function.

  4. File verification - Wikipedia

    en.wikipedia.org/wiki/File_verification

    Several utilities, such as md5deep, can use such checksum files to automatically verify an entire directory of files in one operation. The particular hash algorithm used is often indicated by the file extension of the checksum file. The ".sha1" file extension indicates a checksum file containing 160-bit SHA-1 hashes in sha1sum format.

  5. List of hash functions - Wikipedia

    en.wikipedia.org/wiki/List_of_hash_functions

    hash HAS-160: 160 bits hash HAVAL: 128 to 256 bits hash JH: 224 to 512 bits hash LSH [19] 256 to 512 bits wide-pipe Merkle–Damgård construction: MD2: 128 bits hash MD4: 128 bits hash MD5: 128 bits Merkle–Damgård construction: MD6: up to 512 bits Merkle tree NLFSR (it is also a keyed hash function) RadioGatún: arbitrary ideal mangling ...

  6. Checksum - Wikipedia

    en.wikipedia.org/wiki/Checksum

    For instance, a function returning the start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals [clarification needed], see HMAC.

  7. md5sum - Wikipedia

    en.wikipedia.org/wiki/Md5sum

    md5sum is specific to systems that use GNU coreutils or a clone such as BusyBox. On FreeBSD and OpenBSD the utilities are called md5, sha1, sha256, and sha512. These versions offer slightly different options and features. Additionally, FreeBSD offers the "SKEIN" family of message digests. [4]

  8. Unix security - Wikipedia

    en.wikipedia.org/wiki/Unix_security

    Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the digital signature of a cryptographic hash , such as a SHA-256 based checksum, or the ...

  9. XMODEM - Wikipedia

    en.wikipedia.org/wiki/XMODEM

    When received, the packet's checksum was calculated by the receiver and compared to the one received from the sender at the end of the packet. If the two matched, the receiver sent an <ACK> message back to the sender, which then sent the next packet in sequence. If there was a problem with the checksum, the receiver instead sent a <NAK>.