VX Heaven

Library Collection Sources Engines Constructors Simulators Utilities Links Forum

A Cryptographic Checksum for Integrity Protection

Fred Cohen
Computers and Security Volume 6, Issue 6, pp.505-510
ISSN 0167-4048
December 1987

[Back to index] [Comments]


This paper describes a cryptographic checksum technique for verifying the integrity of information in computer systems with no built-in protection. The technique is based on the use of repeated encryption using an RSA cryptosystem as a pseudo-random number generator (PRNG), the use of a user specified key as a seed for the PRNG, and reduction in a pseudo-random modulus as a means for mixing user specified information with generated numbers.

[Read the article]

By accessing, viewing, downloading or otherwise using this content you agree to be bound by the Terms of Use! aka