>From Wikipedia:

Checksum functions are related to hash functions, fingerprints,
randomisation functions, and cryptographic hash functions. However, each of
those concepts has different applications and therefore different design
goals. Check digits and parity bits are special cases of checksums,
appropriate for small blocks of data (such as Social Security numbers, bank
account numbers, computer words, single bytes, etc.). Some error-correcting
codes are based on special checksums that not only detect common errors but
also allow the original data to be recovered in certain cases.

In my experience:

Checksums are generally computationally easy and generally seem to be used
when speed is important, and cryptographic security is not. Hashes, in my
usage and experience, are used to provide some type of identity to larger
sets of data (fingerprints on files is a common application), and tend to be
used when security is more important than computation speed. 

-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Saul Rennison
Sent: Wednesday, July 08, 2009 3:48 AM
To: Discussion of Half-Life Programming
Subject: Re: [hlcoders] Access reception to hlcoders forum

Would you please explain what the difference is? :)

Sent from my iPhone

On 8 Jul 2009, at 02:52, Bob Somers <[email protected]> wrote:

> SHA-1 is not a checksum, it's a hash. A checksum (like a CRC32, CRC16,
> etc.) is different from a hash.
>
> Also, what Jonas and Harry mentioned applies. Even if it is a hash and
> not a checksum, it could easily just be replace unless it is signed.
>
> --Bob
>
>
>
> On Tue, Jul 7, 2009 at 2:01 PM, Dave Gomboc<[email protected]>  
> wrote:
>>>
>>> Checksums really don't provide security against tampering, as they  
>>> are
>>> too easy to manufacture. They're more often used to detect casual
>>> corruption errors like those that could be introduced during network
>>> transmission.
>>>
>>> --Bob
>>>
>>
>> I'm not sure what your definition of "easy to manufacture" is, but  
>> I'm not
>> aware that the frequently-used SHA-1 would qualify as such.   
>> Finding a
>> collision has been proven to be possible faster than via brute  
>> force attack,
>> but I would think that doing so with contrived data that must also  
>> serve as
>> a working substitute for the original data would still be pretty  
>> difficult
>> (as of July 2009, anyway).  Also, there's better checksums than  
>> SHA-1 that
>> could be used in its stead.
>>
>> Dave
>> _______________________________________________
>> To unsubscribe, edit your list preferences, or view the list  
>> archives, please visit:
>> http://list.valvesoftware.com/mailman/listinfo/hlcoders
>>
>>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list  
> archives, please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlcoders
>

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
http://list.valvesoftware.com/mailman/listinfo/hlcoders



_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlcoders

Reply via email to