We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What are Checksums?

By Adrien-Luc Sanders
Updated: May 16, 2024

Checksums are fixed blocks of information, or datum, used to verify and maintain data integrity when storing and transmitting computerized information. Using mathematical functions, a checksum algorithm tallies the number of bits in a particular block of information and generates a number that represents accurate data. When the data is duplicated by any means, the duplicate is then checked against the original number, via the calculated value. If the numbers match, the data is considered complete and accurate.

Most valid file transfer protocols (FTPs) require some sort of data verification, and many functions are capable of not only detecting, but repairing minor problems with data integrity. Some types of checksums — also known as hash sums — include md5 and cyclic redundancy checks (CRCs). CRCs are a type of checksum known as a polynomial code checksum, capable of identifying accidental alterations to the original data format.

While useful for detecting errors in files downloaded over the web or via peer-to-peer (P2P) networks, checksums are also used in any function wherein data may be corrupted when transferred over a network or in a storage medium. Data errors are often caused by missing, duplicate, or incorrect bits. Since a checksum's value is calculated based on every bit in a data block, even one missing bit can cause a checksum error.

Most files encode checksums directly in their data, usually appended at the end of the file. When the file is transferred to another system or device, the receiver reads the checksum and uses its algorithm to verify that the entire file has been received without error. Files with missing, corrupted, or repeated bits may not function properly, or at all. Others may appear to work correctly despite failing the checksum. Incomplete or corrupted data can continue to degrade over time, until it becomes unusable or causes errors.

Due to their nature, basic checksums are generally only useful in verifying and repairing small blocks of data. As the amount of information increases, so does the likelihood of an error the checksum can neither detect or correct. This can cause corrupted data to repeatedly pass the checksum, generate more errors, and even corrupt the checksum datum.

Cyclic redundancy checks, because of the increased complexity of their algorithms, have a much lower error rate than a standard checksum, and can be applied to larger blocks of data. Although CRCs are not secure, they still provide greater reliability when checking and preserving data integrity. Some software also provides checksum capability and error repair based on custom functions.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
https://www.easytechjunkie.com/what-are-checksums.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.