A checksum is a value generated from a data set to detect errors or changes in the data.

It is commonly used in IT to ensure data integrity during transmission or storage.

Checksums are created using algorithms such as MD5, SHA-1, SHA-256, and SHA-512, which produce a unique value for a given set of data.

Reply to this note

Please Login to reply.

Discussion

Truth.

And the most complex and expensive checksum hashing algorithms are used when the data might be exposed to deliberate manipulation by hostile actors. SHA-256 and above are pretty secure against any current threat.

There are still many valid use cases for older and cheaper hashing algorithms, even CRC32, if only hardware errors are the concern.

i think for the most part CRC-32 is fine but not many systems are so low powered that an sha256 isn't negligible