![]() ![]() There are different types of SHA such as SHA-0, SHA-1, SHA-2 and SHA-3. SHA is a family of cryptographic hash functions that maps a data (or the message) of variable length into a message digest (or hash) of a fixed length. It was designed by the NSA and published by National Institute of Standards and Technology. It is a popular method of error detection as the algorithm for CRC can be embedded into the hardware (in the firmware to be specific) with just a few lines of code. As most of the modern communication is digital in nature i.e., sequence of 1’s and 0’s, there is a chance that a 1 is replaced by 0 and a 0 is replaced by 1.Ĭyclic Redundancy Check or CRC helps in detecting the errors in sequence of bits. It is a technique used in computer networks to detect and correct errors in digital data. CRC is short for Cyclic Redundancy Check.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |