ABSTRACT

A cryptographic hash function can provide assurance of data integrity. A hash function is used to construct a short “fingerprint” of some data; if the data is altered, then the fingerprint will no longer be valid. Even if the data is stored in an insecure place, its integrity can be checked from time to time by recomputing the fingerprint and verifying that the fingerprint has not changed.