|WikiProject Computing||(Rated Start-class)|
|WikiProject Computer science||(Rated Start-class, Mid-importance)|
if you takes look at all the trans actions done with xboom my thief's are using facebook and Yahoo to make the move into my account you will see some friend or media message or some bug that is right behind my transactions that way that I can get in and stay hidden use any ip email or any account I use or phoneto not be seen not one of my transaction 35 to 30 cancelled not thank you email@example.com 7:40 am 12/8/2019 1933 n28 Boise id
common knowledge does not need citationEdit
For the section "Some checksum algorithms", I'd suggest that there should be no citation needed for the exaple, since an example that illustrates a concept like that is the equivalent of a description of how to graph x2=y: it is common knowledge to those who write checksum algorithms. 220.127.116.11 (talk) 01:55, 18 December 2008 (UTC)
How to detect changes to a fileEdit
i just have a question about the checksum when the checksum will be useful to detect changes to the file???????
Checksum is only used to check that the data sent is correct, it doesnt change anything!
In order to ensure content accuracy you should consider using something like MD5 or SHA-1, which are cryptographic hashing algorithms and in wide use for such purposes.
Checksums are good at detecting accidental corruption (e.g. that introduced by signal noise) but the algorithm is sufficiently predictable that it forms no defence against malicious attack. For that sort of purpose, a cryptographic hash function should instead be used, which is a kind of checksumming algorithm that has the additional property that it is pretty easy to go from the data to the hash, but very hard to find some data that hashes to a particular value. (Or at least that's the way it is supposed to work; SHA-256 is the current recommendation for crypto-hash functions as MD5 has been broken and SHA-1 is believed breakable. It should be possible to reference these; they were results from a team in China, and were fairly widely reported even outside the security conference where their papers were.) 18.104.22.168 00:26, 11 January 2007 (UTC)
How to get fuzzy match in search inquiryEdit
I accidentally typed checksun into the search field. Is there a way I could put in, did you mean checksum? Like google does?
- Someone could create a redirect from checksun to checksum.-22.214.171.124 (talk) 11:15, 7 April 2012 (UTC)
example has an errorEdit
Step 3 of the example has an error: the two's complement of 18h is E7h. This means that when testing the checksum byte, the result will be FFh, not 00h as stated. Should 1 be added to the checksum at some point? Klox 21:42, 25 July 2007 (UTC)
- The example does not seem correct: 118h + E8h = 200h, not 100h as stated. Is this a mistake? Brolin Empey 17:42, 10 August 2007 (UTC)
For us non-computery regular folks, howabout using regular numbers instead of hex for clarity? Also, the last digit of a barcode is based on added all the other digits together. Is this a checksum? A bar code would probably be a great example of a checksum at work, as regular people could understand it. —Preceding unsigned comment added by 126.96.36.199 (talk) 22:25, 21 November 2007 (UTC)
- The last digit of a barcode is a "check digit". A "check digit" is a kind of checksum that is only 1 digit long. I agree that better examples would be good. --188.8.131.52 (talk) 07:41, 27 September 2008 (UTC)
Checksums, FEC and hash functionsEdit
These, though apparently similar, are distinguished by their different purposes:
- Checksums are added to data items to provide a simple (incomplete) means of error detection. A checksum is useful to assure the integrity of even a single data instance. This type of checksum is generally much shorter than the data and is only for a cursory check.
- Longer FEC codes that are derived from the data provide both error detection and some error correction capabilities. They can be called checksums but in reality are intended for more than just checking the data. They are used widely in digital communication and represent a significant bandwidth overhead.
- Hash functions are intended to segregate a mass of many data items into a smaller number of groups where, ideally, similar but not identical data items fall into different groups. Hash functions are useful only to detect duplicates or speed searching in a large database, where the data items are assumed to be free of errors. Cuddlyable3 (talk) 14:35, 22 November 2008 (UTC)
Checksums should not be used where data may change!Edit
To strengthen a previous note of warning...
Checksums can guarantee to catch 1-or-2-bit corruption, and are
likely to catch other changes, but cannot be trusted to guarantee
that data has not changed in any general/wholesale way, particularly
for large datasets. A checksum is ultimately/only a highly many-to-one
mapping. I just ran a test, generating a 64-bit checksum for every file
on my computer, and of the 1.5 million-or-so files, I found 60 pairs of
completely different files that shared a checksum (no triples).
184.108.40.206 (talk) 20:36, 7 February 2011 (UTC) Joe Weinstein at Oracle Inc.
Either you are very lucky/unlucky or your 64-bit checksum is using a very poor function. A good 64-bit checksum would have a very small chance of any random false duplicates among a million files.-220.127.116.11 (talk) 11:21, 7 April 2012 (UTC)
A near namesakeEdit
The article should highlight the fact that only the simplest checksum hash functions are order independent. Generally order dependence is preferred, for more sensitive detection of differences. But sometimes order independence is desired (and insensitivity to zeroes) so a simple sum or XOR is desired. In the *nix world this is available with the classic sum utility. But in the Windows world these simple hash functions are very hard to find. The best source seems to be sum, ported in UnxUtils and CoreUtils for Windows.
See superuser.com/questions/168202/difference-between-unxutils-and-gnu-coreutils for details: "Unxutils are windows native, and have no dependancies - but haven't been updated in a while, and are a subset of coreutils."
Lead sentence is incomprehensible to this laymanEdit
"A checksum or hash sum is a sedfrg-size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. "
mentally computed checksumsEdit
The "disposable email address" article briefly mentions "mentally computed checksums". Which Wikipedia article is the best place for more details about such checksums? --DavidCary (talk) 18:33, 11 November 2013 (UTC)
The modular sum section uses this term, which I have never come across. The term is not defined elsewhere in the article nor in the article linked to shortly after the term is used. Searching the web for "Promodular sum" only brings up references to this article, or copies of it, plus some references to a company called Promodular. Can someone either provide references for this term, or remove it?18.104.22.168 (talk) 21:13, 17 July 2015 (UTC)
Error in modular sum description? (resolved, reader error)Edit
The article includes:
A variant of the previous algorithm is to add all the "words" as unsigned binary numbers, discarding any overflow bits, and append the two's complement of the total as the checksum. To validate a message, the receiver adds all the words in the same manner, including the checksum; if the result is not a word full of zeros, an error must have occurred.
The message validation description doesn't sound right. E.g., suppose the words are 001 010. Then the sender computes the sum: 011, and sends along the message 001 010 011. Then the receiver would add all three to get: 110. Then "the result is not a word full of zeros", but it's not the case that "an error … occurred;" in fact, the transmission was correct. Am I missing something, or is this description in the article misleading? 22.214.171.124 (talk) 22:39, 6 January 2016 (UTC)
- Oh, I missed the bit about two's complement. Taking that into consideration, the sender adds 001 and 010 to get 011, then takes the two's complement of 011 to get 101, and sends the message 001 010 101. The sender then adds these and gets (1)000 which, when the overflow is ignored, is 000, a word full of zeros. 126.96.36.199 (talk) 22:45, 6 January 2016 (UTC)
Digest as synonym of checksum-valueEdit
To avoid confusion, when people are looking for checksums as hashes:
- checksum algorithm = hash function algorithm
- checksum input = hash function input = message
- checksum (computed) value = digest (of the message)
The concept of "fuzzy checksum" is used in spam detection. Several such articles already mention the term in their text but, as yet, there is no description in a Wikipedia article.
I'm not sure there is enough material to warrant giving the topic its own WP article, and there is surprisingly little out there as formal reliable sources, so I propose adding a short anchored section at the end of this article (using what sources I can find), and setting up wikilinks from the articles that refer to the term. Any thoughts?