What is a checksum?


A user will find that if the checksum is the same as the stored value of the previously computed checksum, then it is highly likely that the data is free from corruption.

The MD5 algorithm and SHA-1 are the most common types of checksum. The SHA-1 was designed by the United States National Security Agency but has been commonly replaced by SHA-2 and SHA-3 in recent years.

Name of Technology:


Year Introduced:


Invented by :

John G. Fletcher

Open Source or Proprietary:


Main technology category:

Error detection



Previous ArticleWhat is rebooting?
Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *


  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.