expand for answer

Hash Total

A checksum used to verify the integrity of a transmission. See also cyclic redundancy check (CRC). A total of the values on one or more fields, used for the purpose of auditability and control. Value computed on data to detect error or manipulation. (. See checksum. )

Similar items:
A computed value that depends on the contents of a packet. This value is sent along with the packet when it is transmitted. The receiving system computes a new checksum based on receiving data and compares this value with the one sent with the packet. If the two values are the same, the receiver has a high degree of confidence that the data was received correctly. Value computed on data to detect error or manipulation during transmission. (. See hash total. )
A number known as a message digest generated from a hash function. Also . See hash function. Producing hash values for accessing data or for security. A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. Hashing is also a common method of accessing data records. To create an index, called a hash table, for these records, you would apply a formula to each name to produce a unique numeric value.
Cyclic Redundancy CheckCyclical redundancy check.
A process used to check the integrity of a block of data. It provides an integrity check of the data before it is sent out into the wide area network. Its value depends on the hexadecimal value of the number of 1s in the data block. The transmitting device calculates the value and appends it to the data block; the receiving end makes a similar calculation and compares its results to the added character. If there is a difference, the recipient requests retransmission.
A government standard hash function developed by the National Institute of Standards and Technology (NIST) and specified in an official government publication. SHA-1 creates a 160-bit hash value output. Members of the SHA-2 family create a range of hash value outputs: 224, 256, 384 or 512. SHA-3 was still in development at the time of this writing, but the Keccak algorithm has been selected for that emerging standard.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in