8 C# Hashing and Checksum

 

This chapter covers

  • Why we should care about data integrity and their role in data security
  • Using File Checksum and their use in detecting compromised data
  • Working with Hashing algorithms for Checksum generation
  • Implementing the various Hash methods
  • Developing a "File Checksum Checker" application

After successfully building an asynchronous application and having several complete projects under our belt, we are ready to venture into data integrity, its importance, and the tools we have available for that with C#.

With online data nowadays a must in almost every aspect of our lives, the advantages of learning about data security become apparent, especially when we consider the ever-growing need for experts in this field.

Our programming language offers many options to choose from, so we can experiment with various data security methods. As we will see shortly, these methods cover everything from ensuring the correct manipulation of data to anything hashing-related.

We will see what role checksum plays in this context and how we can use cryptographic hashing algorithms to secure our file's integrity.

8.1 Data integrity

 
 
 

8.1.1 What is data integrity

 

8.1.2 Why do we care about data integrity

 
 
 

8.1.3 Types of data integrity

 

8.2 Checksum

 
 
 

8.2.1 What is Checksum

 

8.2.2 Checksum inconsistencies and why we shall not forget the simple things

 
 
 

8.3 Hashing

 
 

8.3.1 What is hashing

 
 
 

8.3.2 What is the difference between cryptographic hashing and non-cryptographic hashing

 
 
 

8.3.3 Types of cryptographic hashing algorithms

 
 
 

8.4 Checksum Checker

 
 

8.4.1 The project

 
 

8.4.2 Our Code

 
 

8.4.3 Source code

 
 

8.5 Summary

 
 
 

8.6 References

 
 
 
sitemap

Unable to load book!

The book could not be loaded.

(try again in a couple of minutes)

manning.com homepage
test yourself with a liveTest