The functioning of check sum and hashing are very similar. Both the techniques takes an input (m) and computes a fixed size string H(m).

Cryptographic hash function has an additional property.

• It is computationally infeasible to find any two different messages x and y such that H(x) = H(y).

• No two messages x and y have similar hash value.

• If m, H (m) are the message and hash of the message created by the sender, then the intruder cannot forge the contents of another message y that has the same hash value as the original message.

Therefore, the above discussed property enables hash to provide a better message integrity check.

If you found this answer helpful, please upvote and share with other students in your network.