Checksum is used for detecting errors that may have surfaced during transmission or storage.

It is necessary for verifying data integrity. The process is conducted by counting the number of bits in a transmission unit.

 Want to know when it was introduced? See next page.

A user will find that if the checksum is the same as the stored value of the previously computed checksum, then it is highly likely that the data is free from corruption.

The MD5 algorithm and SHA-1 are the most common types of checksum. The SHA-1 was designed by the United States National Security Agency but has been commonly replaced by SHA-2 and SHA-3 in recent years.