Home

Checksums

A checksum is a small piece of data derived from a larger data set, used to detect errors that may occur during storage, processing, or transmission. It provides a compact representation of the original data so that changes can be detected when the data is later compared with the checksum.

Checksums are produced by applying an algorithm to the data to yield a fixed-size value, regardless of

Key properties of checksums include determinism—the same input yields the same checksum—and a fixed output length.

Common uses include verifying software downloads and data files, checking backups, and ensuring integrity in network

Because traditional checksums do not provide authentication, they are usually complemented by cryptographic methods when security

the
input
size.
Simple
checksums
may
involve
summing
bytes
and
taking
a
modulo,
while
more
robust
forms
include
cyclic
redundancy
checks
(CRCs)
and
other
fixed-length
results
such
as
Adler-32
or
Fletcher-16/32.
Cryptographic
hash
functions
(for
example
MD5
or
SHA-256)
can
also
be
used
to
verify
data
integrity,
but
they
are
designed
for
resistance
to
tampering
and
serve
different
security
goals
than
traditional
checksums.
They
are
designed
to
detect
changes,
but
are
not
collision-proof:
different
inputs
can
yield
the
same
checksum.
Some
algorithms
have
known
weaknesses;
MD5
and
SHA-1
have
practical
collision
vulnerabilities,
while
CRCs
excel
at
detecting
random
errors
but
are
not
secure
against
intentional
modification.
transmissions
and
storage
systems.
In
networking,
checksums
are
used
in
protocols
such
as
TCP,
UDP,
and
IP
to
detect
corrupted
segments;
the
specific
mechanism
often
involves
a
one’s
complement
sum
over
header
and
data.
is
required.
Techniques
such
as
HMACs
or
digital
signatures
offer
assurances
of
integrity
and
origin
beyond
what
basic
checksums
provide.