Algorithm ran against a file that produces a series of
Posted on: October 18, 2016 at 10:28:25 CT
TigerMatt STL
Posts:
96489
Member For:
26.44 yrs
Level:
User
M.O.B. Votes:
0
unique characters based on factors such as timestamp of last modification, size and content.
The person who receives the file can then run the algorithm again and match the output. If the output matches the original hash, it is proof the file hasnt been tampered with. If it is different, tampering took place.