This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
checksums [2011/10/05 12:45] – scmfcl | checksums [2022/10/08 16:22] (current) – scmfcl | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | A [[wp> | + | ====== File Checksums ====== |
- | verify the integrity of that data. Typically you use a program to | + | |
- | compute the checksum of a file. Then after this file has been | + | |
- | transmitted to some other location the same checksum algorithm is used | + | |
- | to compute the checksum there. If the two checksums are the same, it | + | |
- | is unlikely that the data has been changed during transmission. | + | |
- | You can use [[wp>MD5]] or [[wp> | + | A [[wp>checksum]] (or hash) is a datum computed from digital data to verify the integrity of that data. Typically you use a program |
- | you submit via PATS in this way. We also use it to enable you to hand | + | |
- | in a submission late, while you can prove that is has been genearted | + | |
- | before the deadline. For this you simply have to send the checksum to | + | |
- | use before | + | |
- | details. | + | |
- | Below you find instructions | + | You should **use [[wp> |
- | ===== Creating | + | PATS at some places still uses [[wp>MD5]] or [[wp> |
- | It is usually sufficient to use MD5 checksums and by default we expect | + | ===== Creating SHA2 Checksums ===== |
- | you to submit an MD5 checksum. It looks something like this: | + | |
- | < | + | |
- | 5be5e4773e92dfb5b2add9b8d562c352 | + | |
- | </ | + | |
- | Please make sure you submit the // | + | |
- | In order to generate such a checksum you may use the following MD5 | + | |
- | checksum generators: | + | * Mac OS terminal |
- | | + | * Windows command prompt: |
- | * md5sum command in shell | + | |
- | * Mac OS | + | |
- | * md5 command in terminal | + | |
- | * Windows | + | |
- | * MD5sums, http:// | + | |
- | * FCIV--File Checksum Integrity Verifier http:// | + | |
- | * Bitser, http:// | + | |
- | * FastSum, http:// | + | |
- | * Multiple OS | + | |
- | * JDigest, http:// | + | |
- | ===== Creating SHA1 Checksums ===== | + | ===== Creating SHA1 Checksums |
- | Alterantively you can also use SHA1 checksums. A SHA1 checksum looks something | + | * Linux shell commands: sha1sum, openssl |
- | like this: | + | |
- | < | + | * Windows command prompt: certUtil |
- | | + | |
- | </ | + | |
- | In order to genrate such a checksum you may use the following SHA1 | + | ===== Creating MD5 Checksums |
- | checkusm generators: | + | |
- | * Linux | + | |
- | * sha1sum command in shell | + | |
- | * Max OS | + | |
- | * openssl in terimal, call as < | + | |
- | * Windows | + | |
- | * Bitser, http:// | + | |
- | * Multiple OS | + | |
- | * JDigest, http:// | + | |
- | ===== Other Checksums ===== | + | * Linux shell commands: md5sum |
- | + | * Mac OS terminal commands: md5 | |
- | In exceptional circumstances alternative checksums that are at least | + | * Windows command prompt: certUtil |
- | as reliable as an MD5 checksum may be acceptable (e.g. GNU-PG/PGP file | + | |
- | signatures). But please contact Frank Langbein early if you intend to | + | |
- | use one of these checksum mechanisms. | + | |