#1 Download computer science & engineering books free           #2 Display your sponsored posts here. Reach 20,000+ students. Contact: info[at]cpentalk.com for quote           #3 Take the Ultimate Trivia Quiz. See where you rank globally.
0 votes
in Computer Networks by (user.guest)

1 Answer

0 votes
by (user.guest)
Best answer

The functioning of check sum and hashing are very similar. Both the techniques takes an input (m) and computes a fixed size string H(m).

Cryptographic hash function has an additional property.

• It is computationally infeasible to find any two different messages x and y such that H(x) = H(y).

• No two messages x and y have similar hash value.

• If m, H (m) are the message and hash of the message created by the sender, then the intruder cannot forge the contents of another message y that has the same hash value as the original message.

Therefore, the above discussed property enables hash to provide a better message integrity check.

If you found this answer helpful, please upvote and share with other students in your network.

Related questions

+1 vote
1 answer
Welcome to CPEN Talk
Solution-oriented students of computer engineering on one platform to get you that


Chuck Norris programs occupy 150% of CPU, even when they are not executing.