enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. File verification - Wikipedia

    en.wikipedia.org/wiki/File_verification

    A checksum file is a small file that contains the checksums of other files. There are a few well-known checksum file formats. [1] Several utilities, such as md5deep, can use such checksum files to automatically verify an entire directory of files in one operation. The particular hash algorithm used is often indicated by the file extension of ...

  3. md5sum - Wikipedia

    en.wikipedia.org/wiki/Md5sum

    The MD5 hash functions as a compact digital fingerprint of a file. As with all such hashing algorithms, there is theoretically an unlimited number of files that will have any given MD5 hash. However, it is very unlikely that any two non-identical files in the real world will have the same MD5 hash, unless they have been specifically created to ...

  4. Simple file verification - Wikipedia

    en.wikipedia.org/wiki/Simple_file_verification

    However, the probability of a corrupted file having the same checksum as its original is exceedingly small, unless deliberately constructed to maintain the checksum.) SFV cannot be used to verify the authenticity of files, as CRC32 is not a collision resistant hash function; even if the hash sum file is not tampered with, it is computationally ...

  5. Checksum - Wikipedia

    en.wikipedia.org/wiki/Checksum

    This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.

  6. MD5 - Wikipedia

    en.wikipedia.org/wiki/MD5

    The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, [3] and was specified in 1992 as RFC 1321. MD5 can be used as a checksum to verify data integrity against unintentional corruption.

  7. List of hash functions - Wikipedia

    en.wikipedia.org/wiki/List_of_hash_functions

    hash HAS-160: 160 bits hash HAVAL: 128 to 256 bits hash JH: 224 to 512 bits hash LSH [19] 256 to 512 bits wide-pipe Merkle–Damgård construction: MD2: 128 bits hash MD4: 128 bits hash MD5: 128 bits Merkle–Damgård construction: MD6: up to 512 bits Merkle tree NLFSR (it is also a keyed hash function) RadioGatún: arbitrary ideal mangling ...

  8. cksum - Wikipedia

    en.wikipedia.org/wiki/Cksum

    cksum is a command in Unix and Unix-like operating systems that generates a checksum value for a file or stream of data. The cksum command reads each file given in its arguments, or standard input if no arguments are provided, and outputs the file's 32-bit cyclic redundancy check (CRC) checksum and byte count. [1]

  9. sha1sum - Wikipedia

    en.wikipedia.org/wiki/Sha1sum

    It is commonly used to verify the integrity of files. It (or a variant) is installed by default on most Linux distributions . Typically distributed alongside sha1sum are sha224sum , sha256sum , sha384sum and sha512sum , which use a specific SHA-2 hash function and b2sum , [ 1 ] which uses the BLAKE2 cryptographic hash function.