peterjockisch Practical Application of Cryptographic Checksums
1.1 Introduction
Computer files can be manipulated in many ways unnoticed. Cryptographic checksums, hash values, serve to protect your data: By forming an electronic fingerprint of a file, an always constant numerical value is created. If this value deviates at a later point in time, there is damage or manipulation. With a single mouse click, the integrity of a file can be checked at any time.
NOTE:
1、保证data integrity,分支被篡改
2、"electronic fingerprint" 非常形象的比喻,下面对此进行了专门的说明
Humans are complex creatures. In order to identify them quickly and easily, fingerprints are often created. Computer files can be identified according to the same principle: by generating an “electronic fingerprint”, the so-called cryptographic checksum, an always constant number.