Hire Our Expert Programmer & Technical Writer to do your Capstone Project
0 votes
in Computer Networks by (user.guest)

1 Answer

0 votes
by (user.guest)
Best answer

The functioning of check sum and hashing are very similar. Both the techniques takes an input (m) and computes a fixed size string H(m).

Cryptographic hash function has an additional property.

• It is computationally infeasible to find any two different messages x and y such that H(x) = H(y).

• No two messages x and y have similar hash value.

• If m, H (m) are the message and hash of the message created by the sender, then the intruder cannot forge the contents of another message y that has the same hash value as the original message.

Therefore, the above discussed property enables hash to provide a better message integrity check.

If you found this answer helpful, please upvote and share with other students in your network.

Related questions

+1 vote
1 answer 343 views
asked Oct 4, 2020 in Computer Networks by anonymous
Welcome to CPENTalk.com

Disclaimer: Every user is solely responsible for anything that he/she posts or uploads on CPENTalk.