You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Algorithm that calculates a fixed-size bit value of a given resource(block of data).
5
5
- Hashing transforms this data into a far shorter fixed-length value or key.
6
6
- The hash value can be considered the distilled summary of everything within that file.
@@ -12,13 +12,12 @@ What is Hashing?
12
12
- If it does, this is known as a hash collision.
13
13
- A hash algorithm can only be considered good and acceptable if it can offer a very low chance of collision.
14
14
15
-
Why do we need it?
16
-
- A simple use case is described below,
15
+
#### Why do we need it?
17
16
- If you are transferring a file from one computer to another, how do you ensure that the copied file is the same as the source?
18
17
- One method you could use is called hashing, which is essentially a process that translates information about the file into a code.
19
18
- Two hash values (of the original file and its copy) can be compared to ensure the files are equal.
20
19
21
-
Benefits of Hashing?
20
+
#### Benefits of Hashing?
22
21
- One main use of hashing is to compare two files for equality.
23
22
- Without opening two document files to compare them word-for-word, the calculated hash values of these files will allow the owner to know immediately if they are different.
24
23
- Hashing is also used to verify the integrity of a file after it has been transferred from one place to another, typically in a file backup program like SyncBack.
@@ -27,8 +26,8 @@ Benefits of Hashing?
27
26
- In such cases, it would be impossible to tell at a glance if two similar files are different or not, but the hash values would easily tell these files apart if they are different.
28
27
- Ex. Verifying checksum of a deployed war or jar file on server
29
28
30
-
Types of Hashing
29
+
#### Types of Hashing
31
30
There are many different types of hash algorithms such as RipeMD, Tiger, xxhash and more, but the most common type of hashing used for file integrity checks are MD5, SHA1 and CRC32.
32
-
- MD5 - An MD5 hash function encodes a string of information and encodes it into a 128-bit fingerprint. MD5 is often used as a checksum to verify data integrity. However, due to its age, MD5 is also known to suffer from extensive hash collision vulnerabilities, but it’s still one of the most widely used algorithms in the world.
33
-
- SHA1 – SHA1, developed by the National Security Agency (NSA), is a cryptographic hash function. Results from SHA1 are expressed as a 160-bit hexadecimal number. This hash function is widely considered the successor to MD5.
34
-
- CRC32 – A cyclic redundancy check (CRC) is an error-detecting code often used for detection of accidental changes to data. Encoding the same data string using CRC32 will always result in the same hash output, thus CRC32 is sometimes used as a hash algorithm for file integrity checks.
31
+
-**MD5** - An MD5 hash function encodes a string of information and encodes it into a 128-bit fingerprint. MD5 is often used as a checksum to verify data integrity. However, due to its age, MD5 is also known to suffer from extensive hash collision vulnerabilities, but it’s still one of the most widely used algorithms in the world.
32
+
-**SHA1** – SHA1, developed by the National Security Agency (NSA), is a cryptographic hash function. Results from SHA1 are expressed as a 160-bit hexadecimal number. This hash function is widely considered the successor to MD5.
33
+
-**CRC32** – A cyclic redundancy check (CRC) is an error-detecting code often used for detection of accidental changes to data. Encoding the same data string using CRC32 will always result in the same hash output, thus CRC32 is sometimes used as a hash algorithm for file integrity checks.
0 commit comments