Checksum: Difference between revisions
no edit summary
ClueBot NG (talk  contribs) m (Reverting possible vandalism by 2405:205:A0E1:8BB9:0:0:1E61:C8B1 to version by Coryphantha. Report False Positive? Thanks, ClueBot NG. (3430224) (Bot)) 

The actual [[algorithmprocedure]] which yields the checksum from a data input is called a '''checksum function''' or '''[[checksum algorithm]]'''. Depending on its design goals, a good checksum algorithm will usually output a significantly different value, even for small changes made to the input. This is especially true of [[cryptographic hash function]]s, which may be used to detect many data corruption errors and verify overall [[data integrity]]; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.
Checksum functions are related to [[hash function]]s, [[fingerprint (computing)fingerprint]]s, [[randomization function]]s, and [[cryptographic hash function]]s. However, each of those concepts has different applications and therefore different design goals. For instance, a function returning the start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as [[Cryptographic_primitivecryptographic primitives]] in larger authentication algorithms. For cryptographic systems with these two specific design goals, see [[Hashbased message authentication codeHMAC]].
[[Check digit]]s and [[parity bit]]s are special cases of checksums, appropriate for small blocks of data (such as [[Social Security number]]s, [[bank account]] numbers, [[Word (data type)computer word]]s, single [[byte]]s, etc.). Some [[errorcorrecting code]]s are based on special checksums which not only detect common errors but also allow the original data to be recovered in certain cases.
