An approach to containing computer viruses
Computers and Security
A high speed manipulation detection code
Proceedings on Advances in cryptology---CRYPTO '86
A cryptographic checksum for integrity protection
Computers and Security
On the implications of computer viruses and methods of defense
Computers and Security
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Cryptography and data security
Cryptography and data security
Message Authentication with Manipulation Detection Code
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
Checksums, long used for random error detection in communications, is now being employed to detect changes for integrity purposes. For example, checksums are being used for the detection of computer viruses [POZ86]. The checksum algorithms for detecting random errors are not sufficient against an entity that wishes to "fool" the checksum mechanism. This entity wants to be able to insert a forgery in place of the original data such that an unsuspecting user does not realize the forgery has occurred. This paper describes checksum algorithms and features of checksum algorithms to deter this type of forgery.