This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
checksums [2014/01/13 18:05] – scmfcl | checksums [2022/10/07 01:23] – [File Checksums] scmfcl | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== File Checksums ====== | ====== File Checksums ====== | ||
- | A [[wp> | + | A [[wp> |
- | verify the integrity of that data. Typically you use a program to | + | |
- | compute the checksum of a file. Then after this file has been | + | |
- | transmitted to some other location the same checksum algorithm is used | + | |
- | to compute the checksum there. If the two checksums are the same, it | + | |
- | is unlikely that the data has been changed during transmission. | + | |
- | You can use [[wp>MD5]] or [[wp> | + | You should |
- | you submit via PATS in this way. We also use it to enable you to hand | + | |
- | in a submission | + | |
- | before | + | |
- | use before the submission deadline. Read the [[Submission Guide]] for | + | |
- | details. | + | |
- | Below you find instructions of how to generate | + | PATS at some places still uses [[wp>MD5]] or [[wp>SHA1]] checksums. These can be used to verify that there were no accidental transmission errors, but they cannot be used to verify that offline archives have been transmitted before deadline as they are cryptographically broken. Note that PATS modifies some files after submission (files in the document section are specially processed and with that changed and some archive files are converted to zip for compatibility). |
- | ===== Creating | + | ===== Creating |
- | It is usually sufficient to use MD5 checksums and by default we expect | + | |
- | you to submit an MD5 checksum. It looks something like this: | + | * Mac OS terminal |
- | < | + | * Windows command prompt: |
- | 5be5e4773e92dfb5b2add9b8d562c352 | + | |
- | </ | + | |
- | Please make sure you submit the // | + | |
- | + | ||
- | In order to generate such a checksum you may use the following MD5 | + | |
- | checksum generators: | + | |
- | | + | |
- | * md5sum command in shell | + | |
- | * Mac OS | + | |
- | * md5 command in terminal | + | |
- | * Windows | + | |
- | * MD5sums, http:// | + | |
- | * FCIV--File Checksum Integrity Verifier http:// | + | |
- | * Bitser, http:// | + | |
- | * FastSum, http:// | + | |
- | * Multiple OS | + | |
- | * JDigest, http:// | + | |
===== Creating SHA1 Checksums ===== | ===== Creating SHA1 Checksums ===== | ||
- | Alternatively you can also use SHA1 checksums. A SHA1 checksum looks something | + | * Linux shell commands: sha1sum, openssl |
- | like this: | + | |
- | < | + | * Windows command prompt: certUtil |
- | | + | |
- | </ | + | |
- | In order to generate such a checksum you may use the following SHA1 | + | ===== Creating MD5 Checksums ===== |
- | checksum generators: | + | |
- | * Linux | + | |
- | * sha1sum command in shell | + | |
- | * Max OS | + | |
- | * openssl in terimal, call as < | + | |
- | * Windows | + | |
- | * Bitser, http:// | + | |
- | * Multiple OS | + | |
- | * JDigest, http:// | + | |
- | + | ||
- | ===== Other Checksums ===== | + | |
- | In exceptional circumstances alternative checksums that are at least | + | * Linux shell commands: md5sum |
- | as reliable as an MD5 checksum may be acceptable (e.g. GNU-PG/PGP file | + | * Mac OS terminal commands: md5 |
- | signatures). But please contact Frank Langbein early if you intend to | + | * Windows command prompt: certUtil |
- | use one of these checksum mechanisms. | + | |