Difference between revisions of "Hash value"

From PKC
Jump to navigation Jump to search
(Created page with "According to [https://docs.microsoft.com/en-us/dotnet/standard/security/ensuring-data-integrity-with-hash-codes Microsoft docs]: A hash value is a numeric value of a fixed le...")
 
 
Line 1: Line 1:
According to [https://docs.microsoft.com/en-us/dotnet/standard/security/ensuring-data-integrity-with-hash-codes Microsoft docs]:
According to [https://docs.microsoft.com/en-us/dotnet/standard/security/ensuring-data-integrity-with-hash-codes Microsoft docs]:
  A hash value is a numeric value of a fixed length that uniquely identifies data. Hash values represent large amounts of data as much smaller numeric values, so they are used with digital signatures. You can sign a hash value more efficiently than signing the larger value. Hash values are also useful for verifying the integrity of data sent through insecure channels. The hash value of received data can be compared to the hash value of data as it was sent to determine whether the data was altered.
  A [[hash value]] is a numeric value of a fixed length that uniquely identifies data. Hash values represent large amounts of data as much smaller numeric values, so they are used with digital signatures. You can sign a hash value more efficiently than signing the larger value. [[Hash value]]s are also useful for verifying the integrity of data sent through insecure channels. The hash value of received data can be compared to the hash value of data as it was sent to determine whether the data was altered.

Latest revision as of 07:05, 9 June 2022

According to Microsoft docs:

A hash value is a numeric value of a fixed length that uniquely identifies data. Hash values represent large amounts of data as much smaller numeric values, so they are used with digital signatures. You can sign a hash value more efficiently than signing the larger value. Hash values are also useful for verifying the integrity of data sent through insecure channels. The hash value of received data can be compared to the hash value of data as it was sent to determine whether the data was altered.