Cyclic Redundancy Codes, Checksums, and related issues for computer system data integrity.
Sorry, the page you were looking for in this blog does not exist.
Sorry, the page you were looking for in this blog does not exist.
Subscribe to:
Posts (Atom)
Why To Avoid Hash Algorithms If What You Really Need Is A Checksum
Sometimes we hear that someone plans to use a hash function for fault detection instead of a checksum. This is probably not the best idea, b...
-
Checksums and CRCs involve a repeated computation over the length of a dataword that accumulates a result to form an FCS value. The accumul...
-
Here is a video explaining the mechanics of Cyclic Redundancy Check computations, including: An example of the polynomial division approach...
-
An Improved Modular Addition Checksum Algorithm Philip Koopman This paper introduces a checksum algorithm that provides a new point in the p...