50%

Checksum Calculator


Enter the plain text:

Size : 0 , 0 Characters

Result of Checksum: MD5

Size : 0 , 0 Characters

Checksum Calculator Online


Checksum calculator generator checksum code of string and file. Enter String/Text and generate Checksum.

What is Checksum?

Checksum is used for to check the integrity of data or file. A checksum is cryptographic string which is generated using encryption algorithm.

Checksums are computed using the digital representation of a file or message. It is often expressed as a series of letters and numbers which are used to verify that the contents of the file have not been altered in some way.

It helps to verify information using encryption code after transmitting data over the network.

To verify the integrity of data, when data is sent over the internet it has been sent with the checksum. Once data has been received it can re-verify against the checksum to make sure the the information received is not corrupted or modified.

Why use Checksum?

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity.

The procedure which generates this checksum is called a checksum function or checksum algorithm. Depending on its design goals, a good checksum algorithm usually outputs a significantly different value, even for small changes made to the input. This is especially true of cryptographic hash functions, which may be used to detect many data corruption errors and verify overall data integrity; if the computed checksum for the current data input matches the stored value of a previously computed checksum, there is a very high probability the data has not been accidentally altered or corrupted.

Checksum functions are related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of those concepts has different applications and therefore different design goals. For instance, a function returning the start of a string can provide a hash appropriate for some applications but will never be a suitable checksum. Checksums are used as cryptographic primitives in larger authentication algorithms. For cryptographic systems with these two specific design goals, see HMAC.

Check digits and parity bits are special cases of checksums, appropriate for small blocks of data (such as Social Security numbers, bank account numbers, computer words, single bytes, etc.). Some error-correcting codes are based on special checksums which not only detect common errors but also allow the original data to be recovered in certain cases.

Algorithms Supported

(click on a link to auto select algorithm)

  • MD5
  • SHA-1
  • SHA-224
  • SHA-256
  • SHA-384
  • SHA-512
  • SHA3-224
  • SHA3-256
  • SHA3-384
  • SHA3-512
  • RIPEMD160