Welcome To The Home Of The Visual FoxPro Experts  
home. signup. forum. archives. search. google. articles. downloads. faq. members. weblogs. file info. rss.
 From: Mz
  Where is Mz?
 Metro Manila
 Philippines
 Mz
 To: Sergey Karimov
  Where is Sergey Karimov?
 Reston
 Virginia - United States
 Sergey Karimov
 Tags
Subject: RE: An adhoc Article... mzhash
Thread ID: 50901 Message ID: 51360 # Views: 2 # Ratings: 0
Version: Unknown Category: Other
Date: Saturday, September 11, 2004 6:45:48 AM         
   


> Hi Mz!
>
> Thanks for the article. But what’s the difference between the hash code and the control sum?
> As concern the file protection. It’s very rare that somebody tries to decipher the password or find out the algorithm you use to check if your file has been changed. Usually what you need is just to find the only command in your file:
>
> CMP (compare) &&if Ok then run application
>
> and mark it. That’s it :)
>
> Regards,
> Sergey
>
> PS I’ve read it in books about file protections.

Actually in some ways they are the same.

A checksum or CRC is usually used for Self Check or Self Test for Error Detection. For example:

a EAN13 Barcode has a checksum where the first 12 has a mathematical computation based on the Weight 131313131313.
In this way, it is easy to find out that the Barcode is valid or not.

Moreover, for data transmission in cellphones, the TCP/IP datagram, or other communication protocols, they include a
checksum in the end to confirm that the data sent was complete.

However, there are problems that arises to some CRC checking. Lets say we make a simple Checksum using SUM

thus if we have a number, given, 1234567 the checksum would be...

1 + 2 + 3 + 4 + 5 + 6 + 7 = 28 and we get the Remainder by 28 modulo 10 = 8

Therefore, the data to be sent is 12345678 where 8 is the checksum. The problem in this kind of Checksum,
is that when we interchange the numbers. say 7654321, then we compute:

7 + 6 + 5 + 4 + 3 + 2 + 1 = 28 where the modulo is also equal to 8

So whats the problem with this? The problem is that when we have a string say 'hello' the simple checksum is the
same for 'olleh' or 'helol'.

Because of that, there are new technologies and mathematical computation that arises and there comes the HASH.
The same results will also arise for a longer string of lets say 100MB of File. A 1 or 4 byte of CRC is not enough
for the accuracy of it... so far MD5 is the most reliable and secured HASH algorithm.

-Mz


ENTIRE THREAD

The strength of Logarithm... Posted by Mz @ 9/7/2004 4:06:53 AM
RE: The strength of Logarithm... Posted by Wild Fire @ 9/7/2004 4:23:00 AM
RE: The strength of Logarithm... Posted by Alexander Federizo @ 9/7/2004 4:56:54 AM
RE: The strength of Logarithm... Posted by Mz @ 9/7/2004 5:07:57 AM
RE: The strength of Logarithm... Posted by Alexander Federizo @ 9/7/2004 6:40:06 AM
RE: The strength of Logarithm... Posted by Mz @ 9/7/2004 7:00:06 AM
RE: The strength of Logarithm... Posted by Alexander Federizo @ 9/7/2004 7:23:24 AM
RE: The strength of Logarithm... Posted by Mz @ 9/10/2004 12:47:34 PM
RE: The strength of Logarithms... Posted by Alexander Federizo @ 9/10/2004 6:07:12 PM
RE: The strength of Logarithm... Posted by Boudewijn Lutgerink @ 9/10/2004 8:43:15 AM
An adhoc Article... mzhash Posted by Mz @ 9/10/2004 9:35:34 AM
RE: An adhoc Article... mzhash Posted by Alexander Federizo @ 9/10/2004 5:53:58 PM
RE: An adhoc Article... mzhash Posted by Mz @ 9/11/2004 4:30:58 AM
RE: An adhoc Article... mzhash Posted by Sergey Karimov @ 9/11/2004 5:10:55 AM
RE: An adhoc Article... mzhash Posted by Mz @ 9/11/2004 6:45:48 AM
RE: An adhoc Article... mzhash Posted by Mz @ 9/11/2004 7:00:53 AM
RE: An adhoc Article... mzhash Posted by Sergey Karimov @ 9/11/2004 3:20:46 PM
RE: An adhoc Article... mzhash Posted by Sergey Karimov @ 9/11/2004 3:42:35 PM
RE: An adhoc Article... mzhash Posted by Mz @ 9/12/2004 10:19:23 AM
RE: An adhoc Article... mzhash Posted by Sergey Karimov @ 9/12/2004 4:13:36 PM
RE: An adhoc Article... mzhash Posted by Mz @ 9/13/2004 3:19:33 AM
An approach for Intelectual Property Protection... Posted by Mz @ 9/11/2004 7:12:08 AM
RE: An approach for Intelectual Property Protec... Posted by Dale Dedoroy @ 9/13/2004 4:14:20 AM
RE: An approach for Intelectual Property Protec... Posted by Mz @ 9/13/2004 5:27:30 AM