Cryptography - Data integrity

> Software Security > Cryptography - Key

Table of Contents

1 - About

Data Modeling - Data Integrity in Crypto is generally perform with a hash function. The output of the hash function changes when the input has changed.

See Cryptography - Message Digest (checksum|hash) (sha1|md5)

Advertising