Hey everyone,
Just wanting to know - how does MD5/SHA256 or 512 compare to a CRC check when it comes to detecting if a file has changed or has been tampered? Would CRC be better suited for this task, or would a checksum work fine?
-Debian
Just wanting to know - how does MD5/SHA256 or 512 compare to a CRC check when it comes to detecting if a file has changed or has been tampered? Would CRC be better suited for this task, or would a checksum work fine?
Some reading on this suggests that it is easier to create a different (malware) file with the same checksum as the legitimate one when using CRC. This is apparently much harder than doing so using a hashing algorithm, but it is computationally faster to use CRC.
Several posts suggest that CRC (and BBS users would know this from file xfers) is best used to detect errors created by line noise or data corruption, rather than for file integrity from a security (rather than network engarblement+) standpoint.
I always use SHA256 or SHA512 for this sort of thing for my personal projects. MD5 is outdated, apparently, or so I have read.
Sysop: | StingRay |
---|---|
Location: | Woodstock, GA |
Users: | 85 |
Nodes: | 15 (1 / 14) |
Uptime: | 44:30:47 |
Calls: | 1,052 |
Calls today: | 6 |
Files: | 1,134 |
Messages: | 262,728 |