It is a method of file verification used for encryption
The verification algorithms we are more familiar with include parity check and CRC check. These two types of checks are not immune. Data tampering capabilities, they can check and correct channel errors in data transmission to a certain extent, but they cannot prevent malicious damage to data.
MD5
The "digital fingerprint" feature of the Hash algorithm makes it the most widely used file integrity checksum (Checksum) algorithm, and many Unix systems ( System) provides a command to calculate md5
checksum.
Digital signature
Hash
The algorithm is also an important part of the modern password (PassWORD) system. Due to the slow operation speed of asymmetric algorithms, one-way hash functions play an important role in digital signature protocols.
Digital signature of
Hash
value, also known as "digital digest", can be statistically considered to be equivalent to digital signature of the file itself. of. And such an agreement has other advantages.
Authentication protocol
The following authentication protocol is also called "challenge-authentication mode: when the transmission channel can be intercepted but cannot be tampered with, This is an easy and safe method.