"A hacker can replace needed bits in a file, then add other bits so that the overall file checksum stays valid."
True, but it's very, very hard. And would be made exponentially harder -- effectively impossible -- by taking two checksums of the file using different algorithms. For example taking both a SHA-512 and Whirlpool hash of the file, then concatenating them.
In reply to Re^3: checksum of subroutine
by tobyink
in thread checksum of subroutine
by mnooning
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |