
Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input. The procedure which generates this checksum is called a checksum function or checksum algorithm.


By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.

Effect of a typical checksum function (the Unix cksum utility)Ī checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage.
