<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=File_verification</id>
	<title>File verification - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=File_verification"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=File_verification&amp;action=history"/>
	<updated>2026-05-15T09:17:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=File_verification&amp;diff=2400&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''File verification''' is the process of using an algorithm for verifying the integrity of a computer file. This can be done by comparing two files bit-by-bit, but re...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=File_verification&amp;diff=2400&amp;oldid=prev"/>
		<updated>2019-03-21T03:37:29Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;File verification&amp;#039;&amp;#039;&amp;#039; is the process of using an &lt;a href=&quot;/index.php?title=Algorithm&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Algorithm (page does not exist)&quot;&gt;algorithm&lt;/a&gt; for verifying the integrity of a &lt;a href=&quot;/index.php?title=Computer_file&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Computer file (page does not exist)&quot;&gt;computer file&lt;/a&gt;. This can be done by comparing two files bit-by-bit, but re...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''File verification''' is the process of using an [[algorithm]] for verifying the integrity of a [[computer file]]. This can be done by comparing two files bit-by-bit, but requires two copies of the same file, and may miss systematic corruptions which might occur to both files. A more popular approach is to also store [[checksum]]s (hashes) of files, also known as [[message digest]]s, for later comparison.&lt;br /&gt;
&lt;br /&gt;
== Integrity verification ==&lt;br /&gt;
File integrity can be compromised, usually referred to as the file becoming [[Data corruption|corrupted]]. A file can become corrupted by a variety of ways: faulty [[storage media]], errors in transmission, write errors during copying or moving, [[software bug]]s, and so on.&lt;br /&gt;
&lt;br /&gt;
[[hash function|Hash]]-based verification ensures that a file has not been corrupted by comparing the file's hash value to a previously calculated value. If these values match, the file is presumed to be unmodified. Due to the nature of hash functions, [[hash collision]]s may result in [[false positive]]s, but the likelihood of collisions is often negligible with random corruption.&lt;br /&gt;
&lt;br /&gt;
== Authenticity verification ==&lt;br /&gt;
It is often desirable to verify that a file hasn't been modified in transmission or storage by untrusted parties, for example, to include malicious code such as [[virus]]es or [[Backdoor (computing)|backdoor]]s. To verify the authenticity, a classical hash function is not enough as they are not designed to be [[collision resistance|collision resistant]]; it is computationally trivial for an attacker to cause deliberate hash collisions, meaning that a malicious change in the file is not detected with by a hash comparison. In cryptography, this attack is called a [[preimage attack]].&lt;br /&gt;
&lt;br /&gt;
For this purpose, [[cryptographic hash function]]s are employed often. As long as the hash sums cannot be tampered with &amp;amp;mdash; for example, if they are communicated over a secure channel &amp;amp;mdash; the files can be presumed to be intact. Alternatively, [[digital signature]]s can be employed to assure [[tamper resistance]].&lt;br /&gt;
&lt;br /&gt;
== File formats ==&lt;br /&gt;
&lt;br /&gt;
A '''checksum file''' is a small file that contains the checksums of other files.&lt;br /&gt;
&lt;br /&gt;
There are a few well-known checksum file formats.&lt;br /&gt;
&lt;br /&gt;
Several utilities, such as [[md5deep]], can use such checksum files to automatically verify an entire directory of files in one operation.&lt;br /&gt;
&lt;br /&gt;
The particular hash algorithm used is often indicated by the file extension of the checksum file.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;.sha1&amp;quot; file extension indicates a checksum file containing 160-bit [[SHA-1]] hashes in [[sha1sum]] format.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;.md5&amp;quot; file extension, or a file named &amp;quot;MD5SUMS&amp;quot;, indicates a checksum file containing 128-bit [[MD5]] hashes in [[md5sum]] format.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;.sfv&amp;quot; file extension indicates a checksum file containing 32-bit CRC32 checksums in [[simple file verification]] format.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;crc.list&amp;quot; file indicates a checksum file containing 32-bit CRC checksums in brik format.&lt;br /&gt;
&lt;br /&gt;
As of 2012, best practice recommendations is to use [[SHA-2]] or [[SHA-3]] to generate new file integrity digests;&lt;br /&gt;
and to accept MD5 and SHA1 digests for backward compatibility if stronger digests are not available.&lt;br /&gt;
The theoretically weaker SHA1, the weaker MD5, or much weaker CRC were previously commonly used for file integrity checks.&lt;br /&gt;
&lt;br /&gt;
CRC checksums cannot be used to verify the authenticity of files, as CRC32 is not a [[collision resistance|collision resistant]] hash function --&lt;br /&gt;
even if the hash sum file is not tampered with, it is computationally trivial for an attacker to replace a file with the same CRC digest as the original file, meaning that a malicious change in the file is not detected by a CRC comparison.&lt;br /&gt;
&lt;br /&gt;
== Products ==&lt;br /&gt;
* [[Bitser (software)|Bitser]]&lt;br /&gt;
* [[CimTrak]]&lt;br /&gt;
* [[Verisys]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>