What is a cryptographic checksum and does it verify files? (2024)

What is a cryptographic checksum and does it verify files? (1)

By

  • Rahul Awati

What is a cryptographic checksum?

Generated by a cryptographic algorithm, a cryptographic checksum is a mathematical value assigned to a file sent through a network for verifying that the data contained in that file is unchanged. The algorithm performs numerous mathematical operations to create a hash value, or fixed string of digits. This hash value is then used as a checksum to confirm that the sent file was not changed by an attacker.

A hash value remains unchanged from the time it is created and is considered an "electronic fingerprint" of a file. A cryptographic checksum is assigned to a file and is used to verify that the data in that file has not been tampered with or manipulated, possibly by a malicious entity.

Cryptographic checksums provide the basis of modern cryptography, particularly for signing and encryption, digital signatures, email certificates and website certificates. They are also known as message authentication codes, integrity check values, modification detection codes or message integrity codes.

What is a cryptographic checksum and does it verify files? (2)

How a cryptographic checksum works

A cryptographic checksum is based on hash functions that provide hash values -- also known as hash codes -- for every file. The cryptographic hash function takes an input and produces a fixed-length sequence of numbers and letters. The checksum is of the same length, regardless of the original file's size.

When a user creates a file and makes copies of it, the file always has the same hash code. If as much as one bit of information in the file changes -- say, because it was manipulated by an eavesdropper or data thief -- a different hash code/checksum is generated.

What is a cryptographic checksum and does it verify files? (3)

The hash function checksum procedure ensures that the files sent during communication return the same hash code for the sender and the receiver. If the hash code changes, any damage or manipulation can be easily identified.

If the checksum of the original file is known, an authorized user can run a checksum/hashing utility on the file to match the resulting checksum to the original checksum. If these two checksums match, the file is identical. However, if they don't match, the user can identify a fake version of the original file.

Checksums are used to check files and other data for errors or manipulation that might have occurred during data transmission or storage.

What is a cryptographic checksum and does it verify files? (4)

Cryptographic checksum algorithms

Typical checksum algorithms are MD5, SHA-1, SHA-256 and SHA-512.

MD5, or Message Digest Algorithm 5, is a cryptographic algorithm. It produces a 128-bit checksum. Although MD5 is fast, it is not as secure as the Secure Hash Algorithm (SHA) functions.

The SHA family of algorithms is published by the National Institute of Standards and Technology. One algorithm, SHA-1, produces a 160-bit checksum and is the best-performing checksum, followed by the 256-bit and 512-bit versions.

Checksums play an important role in data protection and file security. Organization or user requirements dictate which checksum is used.

What is a cryptographic checksum and does it verify files? (5)

Applications of cryptographic checksums

Cryptographic checksums help authenticate files and their integrity. These algorithms also make it possible to acknowledge receipt of a file's last processing status.

Checksums are used for applications such as the following:

  • File integrity preservation. Cryptographic checksums help prevent unauthorized access and data manipulation. While version control systems serve a similar function, checksums are considered more effective and secure.
  • Image licensing. There are multiple post-processing phases that images undergo before they are published. Cryptographic checksums can prevent the exploitation of images because the files cannot be modified for contrast characteristics or retouching.
  • Documents with hash values. When publishing documents on the internet or on an intranet, specifying hash values and using Secure Sockets Layer/Transport Layer Security certificates increase document security. Comparing hash values ensures that downloaded documents are free from malicious code or transfer damage.
  • Password storage. A plaintext password stored in the form of its associated hash value is more secure than a normal password. When users reenters their password, the new hash value is compared to the stored value. If there was an intrusion, the plaintext password is not lost.
  • Safe email archiving. Electronic fingerprints of all incoming and outgoing emails are created and stored in encrypted form. When an email is read, the cryptographic checksum is formed again and compared with the original. A changed checksum could indicate email tampering.

How to get cryptographic checksums for your files

A user can compare the checksum of a particular file against the original checksum using utilities in Windows, macOS and Linux. Third-party utilities are not required.

Here is how users can access the checksums for their files in Windows using PowerShell's Get-FileHash command:

  1. Right-click the Start button, and navigate to Windows PowerShell.
    • Or the user can launch PowerShell by searching the Start menu and clicking the Windows PowerShell
  2. Type Get-FileHash followed by a space, and type the path location of the desired file.
    • Or a user can drag and drop files to the PowerShell window to automatically fill in the path.
  3. Run the command by pressing Enter.
  4. The output displays the corresponding algorithm name and the hash value.

If the hash value matches with the original file, then the files are identical. If not, the files are modified or corrupted.

Breaking the hash function: Collision attack

Based on the hash function checksum procedure, the checksums derived for different files should have different lengths. However, there could be an infinite number of computer files, so it's impossible to assign a different value to each file with a checksum number of fixed length.

Also, an attacker could manipulate a file and then try to obtain a file version with the cryptographic checksum that's identical to the original file, possibly by inserting invisible control characters through trial and error. If the attacker succeeds in creating a second file with the same cryptographic checksum as the original file, the hash function is considered broken.

When a bad actor tries to find two inputs producing the same hash value, it is known as a collision attack.

Theoretically, a computer with infinite computational power can break cryptographic checksums by trying out many possibilities in a brute-force attack. Nonetheless, this approach is not feasible since it would require complex calculations that cannot be completed in a reasonable time frame.

See also cryptology, asymmetric cryptography, strong cryptography, quantum cryptography, cryptanalysis, cryptosystem, Rivest-Shamir-Adleman algorithm, stream cipher, private key, public key, session key, International Data Encryption Algorithm and Advanced Encryption Standard.

This was last updated in December 2021

Continue Reading About cryptographic checksum

  • llumio: Subtle data manipulation attacks pose serious threats
  • What are the top secure data transmission methods?
  • Data protection officer responsibilities and role importance
  • 20 keys to a successful enterprise data protection strategy
  • How do attackers build and use phishing kits?

Related Terms

backup storage device
A backup storage device is a hardware component for storing copies of data.Seecompletedefinition
cryptanalysis
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems to understand how they work and to find and improve ...Seecompletedefinition
sensitive information
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an ...Seecompletedefinition

Dig Deeper on Data security and privacy

  • message authentication code (MAC)By: RobertSheldon
  • Hash-based Message Authentication Code (HMAC)By: RahulAwati
  • checksumBy: KinzaYasar
  • Symmetric vs. asymmetric encryption: What's the difference?By: MichaelCobb
What is a cryptographic checksum and does it verify files? (2024)

FAQs

What is a cryptographic checksum and does it verify files? ›

Definitions: A mathematical value created using a cryptographic algorithm that is assigned to data and later used to test the data to verify that the data has not changed.

Is checksum a verification check? ›

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.

Is a cryptographic output used to verify the authenticity of data? ›

A digital signature is a cryptographic output used to verify the authenticity of data. A digital signature algorithm allows for two distinct operations: a signing operation, which uses a signing key to produce a signature over raw data.

What is the purpose of file checksum? ›

A checksum is a string of numbers and letters that act as a fingerprint for a file against which later comparisons can be made to detect errors in the data. They are important because we use them to check files for integrity. Our digital preservation policy uses the UNESCO definition of integrity.

Which is responsible to verify the data and its checksum? ›

Datanodes are responsible for verifying the data they receive before storing the data and its checksum.

How do I verify a checksum file? ›

How to Verify the Checksum of a Downloaded File in 5 Easy Steps
  1. Windows — Download the File. ...
  2. Open a Command Prompt. ...
  3. Go to The Directory Where the File Is Saved. ...
  4. Type certUtil –hashfile [Filename] SHA256 to Generate the Checksum. ...
  5. Compare the Two Checksums. ...
  6. Linux—Download the File. ...
  7. Open a Terminal Window.

How to verify a file? ›

Steps to check and verify file integrity
  1. Based on a comparison of file names, do all the expected files show up?
  2. Do the files have the same checksum?
  3. Is the metadata identical? Or does it differ only where required, like accommodating differences in repositories?
Mar 9, 2022

How does cryptographic verification work? ›

Cryptographic digital signatures use public key algorithms to provide data integrity. When you sign data with a digital signature, someone else can verify the signature, and can prove that the data originated from you and was not altered after you signed it.

How authenticity is achieved in cryptography? ›

Authenticity involves proof of identity. For ensuring message authenticity, RSA algorithm is used. The RSA cryptosystem is the most widely-used public key cryptography algorithm in the world. It can be used to encrypt a message without the need to exchange a secret key separately.

How does cryptography ensure authentication? ›

The user is authenticated by sending to the authentication server his/her username together with a randomly challenge message that is encrypted by the secret key. Whereby, the user is considered as authenticated user if the server can match the received encrypted message using its share secret key.

Is checksum good or bad? ›

While checksum values that don't match can signal something went wrong during transmission, a few factors can cause this to happen, such as the following: an interruption in the internet or network connection; storage or space issues, including problems with the hard drive; a corrupted disk or corrupted file; and.

What is checksum in simple words? ›

check·​sum ˈchek-ˌsəm. : a sum derived from the bits of a segment of computer data that is calculated before and after transmission or storage to assure that the data is free from errors or tampering.

What is a checksum with an example? ›

Checksum is an error detection technique that works with any length message. Checksum uses checksum generator at sender side and checksum validator at the receiver end. SHA, MD-5, etc., are some checksum error detection algorithms. Checksum error detection detects both odd and even number of bits error.

What are the disadvantages of checksum? ›

Disadvantages of Checksum

Using checksum can be a difficult process. It takes some extra time to verify checksum values. The checksum process can be fooled by the parties who can manipulate the checksum values.

Which cryptographic technique is used to verify integrity? ›

Answer: The cryptography technique that can be used to verify data integrity is hashing. Hashing is a process that takes an input (data) and produces a fixed-size string of characters, known as a hash value or digest.

How does checksum detect errors? ›

CheckSum Error Detection:

The receiver performs the same calculation on the received message minus the Checksum byte or bytes. This result is checked against the received Checksum and if they agree then it is assumed that the message is error free. Example: The Checksum will be one byte.

What is a verification check? ›

Definition of 'check verification'

Check verification is a system that checks national databases of information about individuals to make sure that checks will be honored and fraud is not being committed.

What is the difference between a checksum and a check digit? ›

A checksum is a number derived from another number used to check if the first number was received correctly . A check digit is a version of checksum that's a single digit.

Is checksum the same as check digit? ›

Checksums in barcodes

The rightmost digit is a check digit in most of the barcodes also. This digit is also known as the checksum. Let's take a look at checksums in another common barcode – EAN-13.

What is data verification checks? ›

Data verification refers to the process of ensuring that data is accurate, complete, and consistent. It is a critical step in data quality management and involves comparing data against a known and trusted source to check for errors and inconsistencies. See also: file hash, integrity checking.

Top Articles
The Four Functions of Behavior: Understanding Your Child's Actions
Year to Date (YTD) | Formula + Calculator
Centricity Kp Schedule
Westfield Mall Kiosk Rental Prices
Ubg365
Christine Paduch Howell Nj
Alcon National Driving Center Inc
208000 Yen To Usd
Facebook Levels Fyi
Indiana Anon Ib
Jack In The Box Menu 2022
Plusword 358
Cities Within 1 Hour Of Me
Busch Gardens Wait Times
Alabama Teachers Credit Union Albertville Al
Black Men Have Issues
Facility Scheduler Hca North Florida
Forexfactory Calendar Today
Knotty And Vixen
Csusm Verify My Fafsa
‘Hadestown’ Audience Member With Hearing Loss Urges Social Media Users To “Stop Harassing” Lillias White: Actress Is Not “The Enemy”
Milly Bobby Brown Nsfw
The Bear Spaghetti | Culinary Cartel
hdmovie2.bar - hdmovie2 Resources and Information.
LA ABUELA (2021) – „Sie wartet auf Dich“ | Filmkritik
Dan Pfeiffer Message Box
Where To Buy Patti Labelle Sweet Potato Pie - PieProNation.com
Best Jumpshot
Saint Joseph Craigslist
Crytek director says Hunt: Showdown's big August update represents 'a significant relaunch of Hunt: Showdown at a whole new level'
Thedailyground.fedex.com
Frcc D2L Login
Dmitri Wartranslated
Methodist Laborworkx
Melvor Volcanic Cave
Mae Glasses Project Slayers
Acura Rdx Screen Won't Turn On
Where Is The Wps Button On My Verizon Wireless Router
How do I beat the frog in level 532?
fitness-la-verne- - Yahoo Local Search Results
K Pocha - Korean Pub Aurora Reviews
Renfield Showtimes Near Paragon Theaters - Coral Square
David Bromstad Salary Per Episode
New Jersey Motor Vehicle Commission Elizabeth Fotos
Holly Ranch Aussie Farm
Mangakakalot Read Online
Ncqa Report Cards
Salary Calculator UK - Salary After Tax
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6430

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.